Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-1000366 (GCVE-0-2017-1000366)
Vulnerability from cvelistv5 – Published: 2017-06-19 16:00 – Updated: 2024-08-05 22:00- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T22:00:39.873Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
},
{
"name": "1038712",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1038712"
},
{
"name": "42275",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/42275/"
},
{
"name": "RHSA-2017:1712",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1712"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.suse.com/security/cve/CVE-2017-1000366/"
},
{
"name": "RHSA-2017:1479",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1479"
},
{
"name": "RHSA-2017:1480",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1480"
},
{
"name": "99127",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/99127"
},
{
"name": "42276",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/42276/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.suse.com/support/kb/doc/?id=7020973"
},
{
"name": "RHSA-2017:1567",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1567"
},
{
"name": "42274",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/42274/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://access.redhat.com/security/cve/CVE-2017-1000366"
},
{
"name": "RHSA-2017:1481",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1481"
},
{
"name": "DSA-3887",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2017/dsa-3887"
},
{
"name": "GLSA-201706-19",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201706-19"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10205"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2019/Sep/7"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "https://seclists.org/bugtraq/2019/Sep/7"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-06-19T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-09-05T01:06:07",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
},
{
"name": "1038712",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1038712"
},
{
"name": "42275",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/42275/"
},
{
"name": "RHSA-2017:1712",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1712"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.suse.com/security/cve/CVE-2017-1000366/"
},
{
"name": "RHSA-2017:1479",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1479"
},
{
"name": "RHSA-2017:1480",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1480"
},
{
"name": "99127",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/99127"
},
{
"name": "42276",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/42276/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.suse.com/support/kb/doc/?id=7020973"
},
{
"name": "RHSA-2017:1567",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1567"
},
{
"name": "42274",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/42274/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://access.redhat.com/security/cve/CVE-2017-1000366"
},
{
"name": "RHSA-2017:1481",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1481"
},
{
"name": "DSA-3887",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2017/dsa-3887"
},
{
"name": "GLSA-201706-19",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201706-19"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10205"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2019/Sep/7"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "https://seclists.org/bugtraq/2019/Sep/7"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-1000366",
"REQUESTER": "qsa@qualys.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt",
"refsource": "MISC",
"url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
},
{
"name": "1038712",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038712"
},
{
"name": "42275",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42275/"
},
{
"name": "RHSA-2017:1712",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1712"
},
{
"name": "https://www.suse.com/security/cve/CVE-2017-1000366/",
"refsource": "CONFIRM",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366/"
},
{
"name": "RHSA-2017:1479",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1479"
},
{
"name": "RHSA-2017:1480",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1480"
},
{
"name": "99127",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99127"
},
{
"name": "42276",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42276/"
},
{
"name": "https://www.suse.com/support/kb/doc/?id=7020973",
"refsource": "CONFIRM",
"url": "https://www.suse.com/support/kb/doc/?id=7020973"
},
{
"name": "RHSA-2017:1567",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1567"
},
{
"name": "42274",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42274/"
},
{
"name": "https://access.redhat.com/security/cve/CVE-2017-1000366",
"refsource": "CONFIRM",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000366"
},
{
"name": "RHSA-2017:1481",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1481"
},
{
"name": "DSA-3887",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3887"
},
{
"name": "GLSA-201706-19",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201706-19"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10205",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10205"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2019/Sep/7"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/Sep/7"
},
{
"name": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-1000366",
"datePublished": "2017-06-19T16:00:00",
"dateReserved": "2017-06-19T00:00:00",
"dateUpdated": "2024-08-05T22:00:39.873Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2017-1000366\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-06-19T16:29:00.310\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.\"},{\"lang\":\"es\",\"value\":\"Glibc contiene una vulnerabilidad que permite que los valores LD_LIBRARY_PATH especialmente creados para manipular la regi\u00f3n heap/stack de la memoria, generando entonces un alias, lo que podr\u00eda conllevar a la ejecuci\u00f3n del c\u00f3digo arbitrario. Tenga en cuenta que se han realizado cambios de refuerzo adicionales en glibc para evitar la manipulaci\u00f3n del stack y heap de la memoria de almacenamiento din\u00e1mico, pero estos problemas no se pueden explotar directamente, por lo que no se les ha otorgado un CVE. Esto impacta a glibc versi\u00f3n 2.25 y anteriores.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:5:*:server:*:*:*:*:*\",\"matchCriteriaId\":\"5833A489-D6DE-4D51-9E74-189CBC2E28CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A62C9FF6-525F-4706-908C-1081B51AA464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92C9F1C4-55B0-426D-BB5E-01372C23AF97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD6D0378-F0F4-4AAA-80AF-8287C790EC96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF83BB87-B203-48F9-9D06-48A5FE399050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16E6D998-B41D-4B49-9E00-8336D2E40A4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C8D871B-AEA1-4407-AEE3-47EC782250FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98381E61-F082-4302-B51F-5648884F998B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C462C17E-DEB3-4E28-9D3E-FEE97907EC14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45010D45-2FF2-4B04-B115-6B6FE606D598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C81647C-9A53-481D-A54C-36770A093F90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44B067C7-735E-43C9-9188-7E1522A02491\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8442C20-41F9-47FD-9A12-E724D3A31FD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF77CDCF-B9C9-427D-B2BF-36650FB2148C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_long_life:5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0CC2D9E-C769-4810-99DD-540614627FFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"835AE071-CEAE-49E5-8F0C-E5F50FB85EFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13E02156-E748-4820-B76F-7074793837E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6755B6AD-0422-467B-8115-34A60B1D1A40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openstack:cloud_magnum_orchestration:7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B27A3E24-7BC2-4EA9-BFAD-987C2CDEF8DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A24B121-952E-44CD-92CB-3D66E00DD38F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_point_of_sale:11.0:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"51E07D0D-67A6-4DDE-BE4E-959DE0A3314F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*\",\"matchCriteriaId\":\"3F8CE3BD-993B-407F-BAEC-A070F6B46E6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EA337A3-B9A3-4962-B8BD-8E0C7C5B28EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_for_sap:12:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E901D2F9-B4EA-420A-B1DA-4CD5B0A021CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*\",\"matchCriteriaId\":\"35BBD83D-BDC7-4678-BE94-639F59281139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"55C5561F-BE86-4EEA-99D4-8697F8BD9DFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:ltss:*:*:*\",\"matchCriteriaId\":\"0651347C-AE16-4155-98EF-A0A2C63A37A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F84B2729-7B52-4505-9656-1BD31B980705\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:ltss:*:*:*\",\"matchCriteriaId\":\"32C12523-2500-44D0-97EE-E740BD3E61B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server_for_raspberry_pi:12:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4605D055-EA6E-4C90-9277-AC067E1BD02D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"51FA1B64-D002-41CC-908F-3798122ACD25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12.0:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"484E3B41-F560-47A7-9C4C-C0DAF3510818\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.25\",\"matchCriteriaId\":\"9C3B907D-79AF-44AC-BD23-C369CD6AE173\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"7.6.2.14\",\"matchCriteriaId\":\"D6AE5831-D666-4D79-9B37-87A969F9127D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.7.0.0\",\"versionEndIncluding\":\"7.7.2.2\",\"matchCriteriaId\":\"27C7DAE9-3B9A-4062-BB77-683318A739F6\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://seclists.org/fulldisclosure/2019/Sep/7\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2017/dsa-3887\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/99127\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038712\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1479\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1480\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1481\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1567\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1712\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/CVE-2017-1000366\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10205\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Sep/7\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201706-19\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/42274/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/42275/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/42276/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://www.suse.com/security/cve/CVE-2017-1000366/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.suse.com/support/kb/doc/?id=7020973\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2019/Sep/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2017/dsa-3887\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/99127\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038712\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1480\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1481\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1567\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:1712\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/CVE-2017-1000366\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10205\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Sep/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201706-19\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/42274/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/42275/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/42276/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://www.suse.com/security/cve/CVE-2017-1000366/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.suse.com/support/kb/doc/?id=7020973\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
GHSA-45FW-2MCW-H3GW
Vulnerability from github – Published: 2022-05-13 01:14 – Updated: 2025-04-20 03:39glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
{
"affected": [],
"aliases": [
"CVE-2017-1000366"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-06-19T16:29:00Z",
"severity": "HIGH"
},
"details": "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.",
"id": "GHSA-45fw-2mcw-h3gw",
"modified": "2025-04-20T03:39:20Z",
"published": "2022-05-13T01:14:41Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000366"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2017:1479"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2017:1480"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2017:1481"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2017:1567"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2017:1712"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000366"
},
{
"type": "WEB",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10205"
},
{
"type": "WEB",
"url": "https://seclists.org/bugtraq/2019/Sep/7"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201706-19"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/42274"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/42275"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/42276"
},
{
"type": "WEB",
"url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
},
{
"type": "WEB",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366"
},
{
"type": "WEB",
"url": "https://www.suse.com/support/kb/doc/?id=7020973"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2019/Sep/7"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2017/dsa-3887"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/99127"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1038712"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
SUSE-SU-2017:2699-1
Vulnerability from csaf_suse - Published: 2017-10-10 19:37 - Updated: 2017-10-10 19:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for SLES 12 Docker image",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise Server 12 container image has been updated to include\nsecurity and stability fixes.\n\nThe following issues related to building of the container images have been fixed:\n\n- Included krb5 package to avoid the inclusion of krb5-mini which gets selected as a\n dependency by the Build Service solver. (bsc#1056193)\n- Do not install recommended packages when building container images. (bsc#975726)\n\nA number of security issues that have been already fixed by updates released for\nSUSE Linux Enterprise Server 12 are now included in the base image. A package/CVE\ncross-reference is available below.\n\npam:\n\n- CVE-2015-3238\n\nlibtasn1:\n\n- CVE-2015-3622\n- CVE-2016-4008\n\nlibidn:\n\n- CVE-2015-2059\n- CVE-2015-8948\n- CVE-2016-6261\n- CVE-2016-6262\n- CVE-2016-6263\n\nzlib:\n\n- CVE-2016-9840\n- CVE-2016-9841\n- CVE-2016-9842\n- CVE-2016-9843\n\ncurl:\n\n- CVE-2016-5419\n- CVE-2016-5420\n- CVE-2016-5421\n- CVE-2016-7141\n- CVE-2016-7167\n- CVE-2016-8615\n- CVE-2016-8616\n- CVE-2016-8617\n- CVE-2016-8618\n- CVE-2016-8619\n- CVE-2016-8620\n- CVE-2016-8621\n- CVE-2016-8622\n- CVE-2016-8623\n- CVE-2016-8624\n- CVE-2016-9586\n- CVE-2017-1000100\n- CVE-2017-1000101\n- CVE-2017-7407\n\nopenssl:\n\n- CVE-2016-2105\n- CVE-2016-2106\n- CVE-2016-2107\n- CVE-2016-2108\n- CVE-2016-2109\n- CVE-2016-2177\n- CVE-2016-2178\n- CVE-2016-2179\n- CVE-2016-2180\n- CVE-2016-2181\n- CVE-2016-2182\n- CVE-2016-2183\n- CVE-2016-6302\n- CVE-2016-6303\n- CVE-2016-6304\n- CVE-2016-6306\n\nlibxml2:\n\n- CVE-2014-0191\n- CVE-2015-8806\n- CVE-2016-1762\n- CVE-2016-1833\n- CVE-2016-1834\n- CVE-2016-1835\n- CVE-2016-1837\n- CVE-2016-1838\n- CVE-2016-1839\n- CVE-2016-1840\n- CVE-2016-2073\n- CVE-2016-3627\n- CVE-2016-3705\n- CVE-2016-4447\n- CVE-2016-4448\n- CVE-2016-4449\n- CVE-2016-4483\n- CVE-2016-4658\n- CVE-2016-9318\n- CVE-2016-9597\n- CVE-2017-9047\n- CVE-2017-9048\n- CVE-2017-9049\n- CVE-2017-9050\n\nutil-linux:\n\n- CVE-2015-5218\n- CVE-2016-5011\n- CVE-2017-2616\n\ncracklib:\n\n- CVE-2016-6318\n\nsystemd:\n\n- CVE-2014-9770\n- CVE-2015-8842\n- CVE-2016-7796\n\npcre:\n\n- CVE-2014-8964\n- CVE-2015-2325\n- CVE-2015-2327\n- CVE-2015-2328\n- CVE-2015-3210\n- CVE-2015-3217\n- CVE-2015-5073\n- CVE-2015-8380\n- CVE-2015-8381\n- CVE-2015-8382\n- CVE-2015-8383\n- CVE-2015-8384\n- CVE-2015-8385\n- CVE-2015-8386\n- CVE-2015-8387\n- CVE-2015-8388\n- CVE-2015-8389\n- CVE-2015-8390\n- CVE-2015-8391\n- CVE-2015-8392\n- CVE-2015-8393\n- CVE-2015-8394\n- CVE-2015-8395\n- CVE-2016-1283\n- CVE-2016-3191\n\nappamor:\n\n- CVE-2017-6507\n\nbash:\n\n- CVE-2014-6277\n- CVE-2014-6278\n- CVE-2016-0634\n- CVE-2016-7543\n\ncpio:\n\n- CVE-2016-2037\n\nglibc:\n\n- CVE-2016-1234\n- CVE-2016-3075\n- CVE-2016-3706\n- CVE-2016-4429\n- CVE-2017-1000366\n\nperl:\n\n- CVE-2015-8853\n- CVE-2016-1238\n- CVE-2016-2381\n- CVE-2016-6185\n\nlibssh2_org:\n\n- CVE-2016-0787\n\nexpat:\n\n- CVE-2012-6702\n- CVE-2015-1283\n- CVE-2016-0718\n- CVE-2016-5300\n- CVE-2016-9063\n- CVE-2017-9233\n\nncurses:\n\n- CVE-2017-10684\n- CVE-2017-10685\n- CVE-2017-11112\n- CVE-2017-11113\n\nlibksba:\n\n- CVE-2016-4574\n- CVE-2016-4579\n\nlibgcrypt:\n\n- CVE-2015-7511\n- CVE-2016-6313\n- CVE-2017-7526\n\ndbus-1:\n\n- CVE-2014-7824\n- CVE-2015-0245\n\nFinally, the following packages received non-security fixes:\n\n- augeas\n- bzip2\n- ca-certificates-mozilla\n- coreutils\n- cryptsetup\n- cyrus-sasl\n- dirmngr\n- e2fsprogs\n- findutils\n- gpg2\n- insserv-compat\n- kmod\n- libcap\n- libsolv\n- libzypp\n- openldap2\n- p11-kit\n- permissions\n- procps\n- rpm\n- sed\n- shadow\n- zypper\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Module-Containers-12-2017-1672",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2699-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:2699-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172699-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:2699-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html"
},
{
"category": "self",
"summary": "SUSE Bug 1056193",
"url": "https://bugzilla.suse.com/1056193"
},
{
"category": "self",
"summary": "SUSE Bug 975726",
"url": "https://bugzilla.suse.com/975726"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-6702 page",
"url": "https://www.suse.com/security/cve/CVE-2012-6702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0191 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6271 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6271/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6277 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6277/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6278 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6278/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7169 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7187 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7824 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8964 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9770 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9770/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0245 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0245/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1283 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2059 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2325 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2327 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2327/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2328 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3210 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3210/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3217 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3238 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3622 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3622/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5073 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5218 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5276 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5276/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-7511 page",
"url": "https://www.suse.com/security/cve/CVE-2015-7511/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8380 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8381 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8382 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8383 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8383/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8384 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8384/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8385 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8386 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8387 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8387/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8388 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8389 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8390 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8390/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8391 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8391/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8392 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8392/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8393 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8393/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8394 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8394/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8395 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8395/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8806 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8842 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8842/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8853 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8853/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8948 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8948/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0634 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0634/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0718 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0718/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0787 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0787/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1234 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1238 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1283 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1762 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1762/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1833 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1833/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1834 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1834/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1835 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1835/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1837 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1837/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1838 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1838/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1839 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1839/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1840 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1840/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2037 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2073 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2105 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2106 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2107 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2108 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2108/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2109 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2177 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2178 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2179 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2180 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2181 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2181/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2182 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2183 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2381 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3075 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3191 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3627 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3627/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3705 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3705/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3706 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3706/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4008 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4429 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4429/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4447 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4447/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4448 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4449 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4483 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4574 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4574/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4579 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4579/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4658 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4658/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5011 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5011/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5300 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5300/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5419 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5419/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5420 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5420/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5421 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5421/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6185 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6261 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6262 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6262/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6263 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6263/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6302 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6302/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6303 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6304 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6306 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6306/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6313 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6313/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6318 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7141 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7167 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7543 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7796 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7796/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8615 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8616 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8617 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8618 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8619 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8620 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8621 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8622 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8622/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8623 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8624 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9063 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9063/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9318 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9586 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9597 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9840 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9840/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9841 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9841/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9842 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9842/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9843 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9843/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000100 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000100/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000101 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000366 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10684 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10684/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10685 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10685/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11112 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11113 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11113/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2616 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6507 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6507/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7407 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7407/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7526 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7526/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9047 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9048 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9049 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9049/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9050 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9050/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9233 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9233/"
}
],
"title": "Security update for SLES 12 Docker image",
"tracking": {
"current_release_date": "2017-10-10T19:37:24Z",
"generator": {
"date": "2017-10-10T19:37:24Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:2699-1",
"initial_release_date": "2017-10-10T19:37:24Z",
"revision_history": [
{
"date": "2017-10-10T19:37:24Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "sles12-docker-image-1.1.4-20171002.ppc64le",
"product": {
"name": "sles12-docker-image-1.1.4-20171002.ppc64le",
"product_id": "sles12-docker-image-1.1.4-20171002.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "sles12-docker-image-1.1.4-20171002.s390x",
"product": {
"name": "sles12-docker-image-1.1.4-20171002.s390x",
"product_id": "sles12-docker-image-1.1.4-20171002.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "sles12-docker-image-1.1.4-20171002.x86_64",
"product": {
"name": "sles12-docker-image-1.1.4-20171002.x86_64",
"product_id": "sles12-docker-image-1.1.4-20171002.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Containers 12",
"product": {
"name": "SUSE Linux Enterprise Module for Containers 12",
"product_id": "SUSE Linux Enterprise Module for Containers 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-containers:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "sles12-docker-image-1.1.4-20171002.ppc64le as component of SUSE Linux Enterprise Module for Containers 12",
"product_id": "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le"
},
"product_reference": "sles12-docker-image-1.1.4-20171002.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sles12-docker-image-1.1.4-20171002.s390x as component of SUSE Linux Enterprise Module for Containers 12",
"product_id": "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x"
},
"product_reference": "sles12-docker-image-1.1.4-20171002.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sles12-docker-image-1.1.4-20171002.x86_64 as component of SUSE Linux Enterprise Module for Containers 12",
"product_id": "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
},
"product_reference": "sles12-docker-image-1.1.4-20171002.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-6702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-6702"
}
],
"notes": [
{
"category": "general",
"text": "Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-6702",
"url": "https://www.suse.com/security/cve/CVE-2012-6702"
},
{
"category": "external",
"summary": "SUSE Bug 983215 for CVE-2012-6702",
"url": "https://bugzilla.suse.com/983215"
},
{
"category": "external",
"summary": "SUSE Bug 983216 for CVE-2012-6702",
"url": "https://bugzilla.suse.com/983216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2012-6702"
},
{
"cve": "CVE-2014-0191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-0191"
}
],
"notes": [
{
"category": "general",
"text": "The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-0191",
"url": "https://www.suse.com/security/cve/CVE-2014-0191"
},
{
"category": "external",
"summary": "SUSE Bug 1014873 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/1014873"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 876652 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/876652"
},
{
"category": "external",
"summary": "SUSE Bug 877506 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/877506"
},
{
"category": "external",
"summary": "SUSE Bug 996079 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/996079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2014-0191"
},
{
"cve": "CVE-2014-6271",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6271"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6271",
"url": "https://www.suse.com/security/cve/CVE-2014-6271"
},
{
"category": "external",
"summary": "SUSE Bug 1024628 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/1024628"
},
{
"category": "external",
"summary": "SUSE Bug 1130324 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/1130324"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 896776 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/896776"
},
{
"category": "external",
"summary": "SUSE Bug 898346 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898346"
},
{
"category": "external",
"summary": "SUSE Bug 898604 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898604"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/900127"
},
{
"category": "external",
"summary": "SUSE Bug 900454 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/900454"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2014-6271"
},
{
"cve": "CVE-2014-6277",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6277"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6277",
"url": "https://www.suse.com/security/cve/CVE-2014-6277"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/900127"
},
{
"category": "external",
"summary": "SUSE Bug 900454 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/900454"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2014-6277"
},
{
"cve": "CVE-2014-6278",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6278"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6278",
"url": "https://www.suse.com/security/cve/CVE-2014-6278"
},
{
"category": "external",
"summary": "SUSE Bug 898604 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/898604"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/900127"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2014-6278"
},
{
"cve": "CVE-2014-7169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7169"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7169",
"url": "https://www.suse.com/security/cve/CVE-2014-7169"
},
{
"category": "external",
"summary": "SUSE Bug 1024628 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/1024628"
},
{
"category": "external",
"summary": "SUSE Bug 1130324 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/1130324"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 896776 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/896776"
},
{
"category": "external",
"summary": "SUSE Bug 898346 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898346"
},
{
"category": "external",
"summary": "SUSE Bug 898762 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898762"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 899039 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/899039"
},
{
"category": "external",
"summary": "SUSE Bug 899266 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/899266"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/900127"
},
{
"category": "external",
"summary": "SUSE Bug 900454 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/900454"
},
{
"category": "external",
"summary": "SUSE Bug 902237 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/902237"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2014-7169"
},
{
"cve": "CVE-2014-7187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7187"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7187",
"url": "https://www.suse.com/security/cve/CVE-2014-7187"
},
{
"category": "external",
"summary": "SUSE Bug 1024628 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/1024628"
},
{
"category": "external",
"summary": "SUSE Bug 898603 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898603"
},
{
"category": "external",
"summary": "SUSE Bug 898762 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898762"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 899039 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/899039"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2014-7187"
},
{
"cve": "CVE-2014-7824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7824"
}
],
"notes": [
{
"category": "general",
"text": "D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7824",
"url": "https://www.suse.com/security/cve/CVE-2014-7824"
},
{
"category": "external",
"summary": "SUSE Bug 904017 for CVE-2014-7824",
"url": "https://bugzilla.suse.com/904017"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2014-7824"
},
{
"cve": "CVE-2014-8964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8964"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8964",
"url": "https://www.suse.com/security/cve/CVE-2014-8964"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 924960 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/924960"
},
{
"category": "external",
"summary": "SUSE Bug 933288 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/933288"
},
{
"category": "external",
"summary": "SUSE Bug 936408 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/936408"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2014-8964"
},
{
"cve": "CVE-2014-9770",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9770"
}
],
"notes": [
{
"category": "general",
"text": "tmpfiles.d/systemd.conf in systemd before 214 uses weak permissions for journal files under (1) /run/log/journal/%m and (2) /var/log/journal/%m, which allows local users to obtain sensitive information by reading these files.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9770",
"url": "https://www.suse.com/security/cve/CVE-2014-9770"
},
{
"category": "external",
"summary": "SUSE Bug 972612 for CVE-2014-9770",
"url": "https://bugzilla.suse.com/972612"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2014-9770"
},
{
"cve": "CVE-2015-0245",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0245"
}
],
"notes": [
{
"category": "general",
"text": "D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0245",
"url": "https://www.suse.com/security/cve/CVE-2015-0245"
},
{
"category": "external",
"summary": "SUSE Bug 1003898 for CVE-2015-0245",
"url": "https://bugzilla.suse.com/1003898"
},
{
"category": "external",
"summary": "SUSE Bug 916343 for CVE-2015-0245",
"url": "https://bugzilla.suse.com/916343"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2015-0245"
},
{
"cve": "CVE-2015-1283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1283"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1283",
"url": "https://www.suse.com/security/cve/CVE-2015-1283"
},
{
"category": "external",
"summary": "SUSE Bug 1034050 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/1034050"
},
{
"category": "external",
"summary": "SUSE Bug 939077 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/939077"
},
{
"category": "external",
"summary": "SUSE Bug 979441 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/979441"
},
{
"category": "external",
"summary": "SUSE Bug 980391 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/980391"
},
{
"category": "external",
"summary": "SUSE Bug 983985 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/983985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-1283"
},
{
"cve": "CVE-2015-2059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2059"
}
],
"notes": [
{
"category": "general",
"text": "The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2059",
"url": "https://www.suse.com/security/cve/CVE-2015-2059"
},
{
"category": "external",
"summary": "SUSE Bug 1173590 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/1173590"
},
{
"category": "external",
"summary": "SUSE Bug 919214 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/919214"
},
{
"category": "external",
"summary": "SUSE Bug 923241 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/923241"
},
{
"category": "external",
"summary": "SUSE Bug 937096 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/937096"
},
{
"category": "external",
"summary": "SUSE Bug 937097 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/937097"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2015-2059"
},
{
"cve": "CVE-2015-2325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2325"
}
],
"notes": [
{
"category": "general",
"text": "The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2325",
"url": "https://www.suse.com/security/cve/CVE-2015-2325"
},
{
"category": "external",
"summary": "SUSE Bug 924960 for CVE-2015-2325",
"url": "https://bugzilla.suse.com/924960"
},
{
"category": "external",
"summary": "SUSE Bug 933288 for CVE-2015-2325",
"url": "https://bugzilla.suse.com/933288"
},
{
"category": "external",
"summary": "SUSE Bug 936408 for CVE-2015-2325",
"url": "https://bugzilla.suse.com/936408"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-2325",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-2325"
},
{
"cve": "CVE-2015-2327",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2327"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.36 mishandles the /(((a\\2)|(a*)\\g\u003c-1\u003e))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2327",
"url": "https://www.suse.com/security/cve/CVE-2015-2327"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-2327",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957567 for CVE-2015-2327",
"url": "https://bugzilla.suse.com/957567"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-2327"
},
{
"cve": "CVE-2015-2328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2328"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2328",
"url": "https://www.suse.com/security/cve/CVE-2015-2328"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-2328",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957600 for CVE-2015-2328",
"url": "https://bugzilla.suse.com/957600"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-2328"
},
{
"cve": "CVE-2015-3210",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3210"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P\u003cB\u003ec)(?P\u003cB\u003ea(?P=B)))\u003eWGXCREDITS)/, a different vulnerability than CVE-2015-8384.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3210",
"url": "https://www.suse.com/security/cve/CVE-2015-3210"
},
{
"category": "external",
"summary": "SUSE Bug 933288 for CVE-2015-3210",
"url": "https://bugzilla.suse.com/933288"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-3210",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-3210",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2015-3210"
},
{
"cve": "CVE-2015-3217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3217"
}
],
"notes": [
{
"category": "general",
"text": "PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\\\.|([^\\\\\\\\W_])?)+)+$/.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3217",
"url": "https://www.suse.com/security/cve/CVE-2015-3217"
},
{
"category": "external",
"summary": "SUSE Bug 933878 for CVE-2015-3217",
"url": "https://bugzilla.suse.com/933878"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-3217",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2015-3217"
},
{
"cve": "CVE-2015-3238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3238"
}
],
"notes": [
{
"category": "general",
"text": "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3238",
"url": "https://www.suse.com/security/cve/CVE-2015-3238"
},
{
"category": "external",
"summary": "SUSE Bug 1123794 for CVE-2015-3238",
"url": "https://bugzilla.suse.com/1123794"
},
{
"category": "external",
"summary": "SUSE Bug 934920 for CVE-2015-3238",
"url": "https://bugzilla.suse.com/934920"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-3238"
},
{
"cve": "CVE-2015-3622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3622"
}
],
"notes": [
{
"category": "general",
"text": "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3622",
"url": "https://www.suse.com/security/cve/CVE-2015-3622"
},
{
"category": "external",
"summary": "SUSE Bug 929414 for CVE-2015-3622",
"url": "https://bugzilla.suse.com/929414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2015-3622"
},
{
"cve": "CVE-2015-5073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5073"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5073",
"url": "https://www.suse.com/security/cve/CVE-2015-5073"
},
{
"category": "external",
"summary": "SUSE Bug 936227 for CVE-2015-5073",
"url": "https://bugzilla.suse.com/936227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-5073"
},
{
"cve": "CVE-2015-5218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5218"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5218",
"url": "https://www.suse.com/security/cve/CVE-2015-5218"
},
{
"category": "external",
"summary": "SUSE Bug 949754 for CVE-2015-5218",
"url": "https://bugzilla.suse.com/949754"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2015-5218"
},
{
"cve": "CVE-2015-5276",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5276"
}
],
"notes": [
{
"category": "general",
"text": "The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5276",
"url": "https://www.suse.com/security/cve/CVE-2015-5276"
},
{
"category": "external",
"summary": "SUSE Bug 945842 for CVE-2015-5276",
"url": "https://bugzilla.suse.com/945842"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-5276"
},
{
"cve": "CVE-2015-7511",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-7511"
}
],
"notes": [
{
"category": "general",
"text": "Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-7511",
"url": "https://www.suse.com/security/cve/CVE-2015-7511"
},
{
"category": "external",
"summary": "SUSE Bug 965902 for CVE-2015-7511",
"url": "https://bugzilla.suse.com/965902"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-7511"
},
{
"cve": "CVE-2015-8380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8380"
}
],
"notes": [
{
"category": "general",
"text": "The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \\01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8380",
"url": "https://www.suse.com/security/cve/CVE-2015-8380"
},
{
"category": "external",
"summary": "SUSE Bug 957566 for CVE-2015-8380",
"url": "https://bugzilla.suse.com/957566"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2015-8380"
},
{
"cve": "CVE-2015-8381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8381"
}
],
"notes": [
{
"category": "general",
"text": "The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?\u0027R\u0027)(\\k\u0027R\u0027)|((?\u0027R\u0027)))H\u0027Rk\u0027Rf)|s(?\u0027R\u0027))))/ and /(?J:(?|(:(?|(?\u0027R\u0027)(\\z(?|(?\u0027R\u0027)(\\k\u0027R\u0027)|((?\u0027R\u0027)))k\u0027R\u0027)|((?\u0027R\u0027)))H\u0027Ak\u0027Rf)|s(?\u0027R\u0027)))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8381",
"url": "https://www.suse.com/security/cve/CVE-2015-8381"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-8381",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8381",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8381",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-8381"
},
{
"cve": "CVE-2015-8382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8382"
}
],
"notes": [
{
"category": "general",
"text": "The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8382",
"url": "https://www.suse.com/security/cve/CVE-2015-8382"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8382",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8382",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8382"
},
{
"cve": "CVE-2015-8383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8383"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8383",
"url": "https://www.suse.com/security/cve/CVE-2015-8383"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8383",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8383",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8383"
},
{
"cve": "CVE-2015-8384",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8384"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the /(?J)(?\u0027d\u0027(?\u0027d\u0027\\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8384",
"url": "https://www.suse.com/security/cve/CVE-2015-8384"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-8384",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8384",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8384",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8384"
},
{
"cve": "CVE-2015-8385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8385"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the /(?|(\\k\u0027Pm\u0027)|(?\u0027Pm\u0027))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8385",
"url": "https://www.suse.com/security/cve/CVE-2015-8385"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8385",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8385",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8385"
},
{
"cve": "CVE-2015-8386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8386"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8386",
"url": "https://www.suse.com/security/cve/CVE-2015-8386"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8386",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8386",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8386"
},
{
"cve": "CVE-2015-8387",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8387"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8387",
"url": "https://www.suse.com/security/cve/CVE-2015-8387"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8387",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8387",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8387"
},
{
"cve": "CVE-2015-8388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8388"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the /(?=di(?\u003c=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8388",
"url": "https://www.suse.com/security/cve/CVE-2015-8388"
},
{
"category": "external",
"summary": "SUSE Bug 936227 for CVE-2015-8388",
"url": "https://bugzilla.suse.com/936227"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8388",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8388",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8388"
},
{
"cve": "CVE-2015-8389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8389"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8389",
"url": "https://www.suse.com/security/cve/CVE-2015-8389"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8389",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8389",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8389"
},
{
"cve": "CVE-2015-8390",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8390"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the [: and \\\\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8390",
"url": "https://www.suse.com/security/cve/CVE-2015-8390"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8390",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8390",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8390"
},
{
"cve": "CVE-2015-8391",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8391"
}
],
"notes": [
{
"category": "general",
"text": "The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8391",
"url": "https://www.suse.com/security/cve/CVE-2015-8391"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8391",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8391",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8391"
},
{
"cve": "CVE-2015-8392",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8392"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles certain instances of the (?| substring, which allows remote attackers to cause a denial of service (unintended recursion and buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8395.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8392",
"url": "https://www.suse.com/security/cve/CVE-2015-8392"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-8392",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8392",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8392",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-8392"
},
{
"cve": "CVE-2015-8393",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8393"
}
],
"notes": [
{
"category": "general",
"text": "pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8393",
"url": "https://www.suse.com/security/cve/CVE-2015-8393"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8393",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8393",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8393"
},
{
"cve": "CVE-2015-8394",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8394"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the (?(\u003cdigits\u003e) and (?(R\u003cdigits\u003e) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8394",
"url": "https://www.suse.com/security/cve/CVE-2015-8394"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8394",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8394",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8394"
},
{
"cve": "CVE-2015-8395",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8395"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles certain references, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8392.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8395",
"url": "https://www.suse.com/security/cve/CVE-2015-8395"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-8395",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8395",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8395",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8395"
},
{
"cve": "CVE-2015-8806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8806"
}
],
"notes": [
{
"category": "general",
"text": "dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the \"\u003c!DOCTYPE html\" substring in a crafted HTML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8806",
"url": "https://www.suse.com/security/cve/CVE-2015-8806"
},
{
"category": "external",
"summary": "SUSE Bug 963963 for CVE-2015-8806",
"url": "https://bugzilla.suse.com/963963"
},
{
"category": "external",
"summary": "SUSE Bug 965283 for CVE-2015-8806",
"url": "https://bugzilla.suse.com/965283"
},
{
"category": "external",
"summary": "SUSE Bug 981114 for CVE-2015-8806",
"url": "https://bugzilla.suse.com/981114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-8806"
},
{
"cve": "CVE-2015-8842",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8842"
}
],
"notes": [
{
"category": "general",
"text": "tmpfiles.d/systemd.conf in systemd before 229 uses weak permissions for /var/log/journal/%m/system.journal, which allows local users to obtain sensitive information by reading the file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8842",
"url": "https://www.suse.com/security/cve/CVE-2015-8842"
},
{
"category": "external",
"summary": "SUSE Bug 972612 for CVE-2015-8842",
"url": "https://bugzilla.suse.com/972612"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-8842"
},
{
"cve": "CVE-2015-8853",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8853"
}
],
"notes": [
{
"category": "general",
"text": "The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by \"a\\x80.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8853",
"url": "https://www.suse.com/security/cve/CVE-2015-8853"
},
{
"category": "external",
"summary": "SUSE Bug 976584 for CVE-2015-8853",
"url": "https://bugzilla.suse.com/976584"
},
{
"category": "external",
"summary": "SUSE Bug 997948 for CVE-2015-8853",
"url": "https://bugzilla.suse.com/997948"
},
{
"category": "external",
"summary": "SUSE Bug 997950 for CVE-2015-8853",
"url": "https://bugzilla.suse.com/997950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-8853"
},
{
"cve": "CVE-2015-8948",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8948"
}
],
"notes": [
{
"category": "general",
"text": "idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8948",
"url": "https://www.suse.com/security/cve/CVE-2015-8948"
},
{
"category": "external",
"summary": "SUSE Bug 1014473 for CVE-2015-8948",
"url": "https://bugzilla.suse.com/1014473"
},
{
"category": "external",
"summary": "SUSE Bug 1173590 for CVE-2015-8948",
"url": "https://bugzilla.suse.com/1173590"
},
{
"category": "external",
"summary": "SUSE Bug 1190777 for CVE-2015-8948",
"url": "https://bugzilla.suse.com/1190777"
},
{
"category": "external",
"summary": "SUSE Bug 990189 for CVE-2015-8948",
"url": "https://bugzilla.suse.com/990189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-8948"
},
{
"cve": "CVE-2016-0634",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0634"
}
],
"notes": [
{
"category": "general",
"text": "The expansion of \u0027\\h\u0027 in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in \u0027hostname\u0027 of a machine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0634",
"url": "https://www.suse.com/security/cve/CVE-2016-0634"
},
{
"category": "external",
"summary": "SUSE Bug 1000396 for CVE-2016-0634",
"url": "https://bugzilla.suse.com/1000396"
},
{
"category": "external",
"summary": "SUSE Bug 1001299 for CVE-2016-0634",
"url": "https://bugzilla.suse.com/1001299"
},
{
"category": "external",
"summary": "SUSE Bug 1159416 for CVE-2016-0634",
"url": "https://bugzilla.suse.com/1159416"
},
{
"category": "external",
"summary": "SUSE Bug 1188388 for CVE-2016-0634",
"url": "https://bugzilla.suse.com/1188388"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-0634"
},
{
"cve": "CVE-2016-0718",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0718"
}
],
"notes": [
{
"category": "general",
"text": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0718",
"url": "https://www.suse.com/security/cve/CVE-2016-0718"
},
{
"category": "external",
"summary": "SUSE Bug 979441 for CVE-2016-0718",
"url": "https://bugzilla.suse.com/979441"
},
{
"category": "external",
"summary": "SUSE Bug 991809 for CVE-2016-0718",
"url": "https://bugzilla.suse.com/991809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-0718"
},
{
"cve": "CVE-2016-0787",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0787"
}
],
"notes": [
{
"category": "general",
"text": "The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a \"bits/bytes confusion bug.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0787",
"url": "https://www.suse.com/security/cve/CVE-2016-0787"
},
{
"category": "external",
"summary": "SUSE Bug 1149968 for CVE-2016-0787",
"url": "https://bugzilla.suse.com/1149968"
},
{
"category": "external",
"summary": "SUSE Bug 967026 for CVE-2016-0787",
"url": "https://bugzilla.suse.com/967026"
},
{
"category": "external",
"summary": "SUSE Bug 968174 for CVE-2016-0787",
"url": "https://bugzilla.suse.com/968174"
},
{
"category": "external",
"summary": "SUSE Bug 974691 for CVE-2016-0787",
"url": "https://bugzilla.suse.com/974691"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-0787"
},
{
"cve": "CVE-2016-1234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1234"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1234",
"url": "https://www.suse.com/security/cve/CVE-2016-1234"
},
{
"category": "external",
"summary": "SUSE Bug 1020940 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/1020940"
},
{
"category": "external",
"summary": "SUSE Bug 969727 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/969727"
},
{
"category": "external",
"summary": "SUSE Bug 988770 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/988770"
},
{
"category": "external",
"summary": "SUSE Bug 988782 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/988782"
},
{
"category": "external",
"summary": "SUSE Bug 989127 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/989127"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1234"
},
{
"cve": "CVE-2016-1238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1238"
}
],
"notes": [
{
"category": "general",
"text": "(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1238",
"url": "https://www.suse.com/security/cve/CVE-2016-1238"
},
{
"category": "external",
"summary": "SUSE Bug 1108749 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/1108749"
},
{
"category": "external",
"summary": "SUSE Bug 1123389 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/1123389"
},
{
"category": "external",
"summary": "SUSE Bug 987887 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/987887"
},
{
"category": "external",
"summary": "SUSE Bug 988311 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/988311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1238"
},
{
"cve": "CVE-2016-1283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1283"
}
],
"notes": [
{
"category": "general",
"text": "The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\\\"){99}-))(?J)(?\u0027R\u0027(?\u0027R\u0027\u003c((?\u0027RR\u0027(?\u0027R\u0027\\){97)?J)?J)(?\u0027R\u0027(?\u0027R\u0027\\){99|(:(?|(?\u0027R\u0027)(\\k\u0027R\u0027)|((?\u0027R\u0027)))H\u0027R\u0027R)(H\u0027R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1283",
"url": "https://www.suse.com/security/cve/CVE-2016-1283"
},
{
"category": "external",
"summary": "SUSE Bug 960837 for CVE-2016-1283",
"url": "https://bugzilla.suse.com/960837"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2016-1283"
},
{
"cve": "CVE-2016-1762",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1762"
}
],
"notes": [
{
"category": "general",
"text": "The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1762",
"url": "https://www.suse.com/security/cve/CVE-2016-1762"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1762",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981040 for CVE-2016-1762",
"url": "https://bugzilla.suse.com/981040"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1762"
},
{
"cve": "CVE-2016-1833",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1833"
}
],
"notes": [
{
"category": "general",
"text": "The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1833",
"url": "https://www.suse.com/security/cve/CVE-2016-1833"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1833",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981108 for CVE-2016-1833",
"url": "https://bugzilla.suse.com/981108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1833"
},
{
"cve": "CVE-2016-1834",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1834"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1834",
"url": "https://www.suse.com/security/cve/CVE-2016-1834"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1834",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981041 for CVE-2016-1834",
"url": "https://bugzilla.suse.com/981041"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1834"
},
{
"cve": "CVE-2016-1835",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1835"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1835",
"url": "https://www.suse.com/security/cve/CVE-2016-1835"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1835",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981109 for CVE-2016-1835",
"url": "https://bugzilla.suse.com/981109"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1835"
},
{
"cve": "CVE-2016-1837",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1837"
}
],
"notes": [
{
"category": "general",
"text": "Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1837",
"url": "https://www.suse.com/security/cve/CVE-2016-1837"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1837",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981111 for CVE-2016-1837",
"url": "https://bugzilla.suse.com/981111"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1837"
},
{
"cve": "CVE-2016-1838",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1838"
}
],
"notes": [
{
"category": "general",
"text": "The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1838",
"url": "https://www.suse.com/security/cve/CVE-2016-1838"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1838",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981112 for CVE-2016-1838",
"url": "https://bugzilla.suse.com/981112"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1838"
},
{
"cve": "CVE-2016-1839",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1839"
}
],
"notes": [
{
"category": "general",
"text": "The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1839",
"url": "https://www.suse.com/security/cve/CVE-2016-1839"
},
{
"category": "external",
"summary": "SUSE Bug 1039069 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1039069"
},
{
"category": "external",
"summary": "SUSE Bug 1039661 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1039661"
},
{
"category": "external",
"summary": "SUSE Bug 1069433 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1069433"
},
{
"category": "external",
"summary": "SUSE Bug 1069690 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1069690"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 963963 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/963963"
},
{
"category": "external",
"summary": "SUSE Bug 981114 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/981114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1839"
},
{
"cve": "CVE-2016-1840",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1840"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1840",
"url": "https://www.suse.com/security/cve/CVE-2016-1840"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1840",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981115 for CVE-2016-1840",
"url": "https://bugzilla.suse.com/981115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1840"
},
{
"cve": "CVE-2016-2037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2037"
}
],
"notes": [
{
"category": "general",
"text": "The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2037",
"url": "https://www.suse.com/security/cve/CVE-2016-2037"
},
{
"category": "external",
"summary": "SUSE Bug 1028410 for CVE-2016-2037",
"url": "https://bugzilla.suse.com/1028410"
},
{
"category": "external",
"summary": "SUSE Bug 963448 for CVE-2016-2037",
"url": "https://bugzilla.suse.com/963448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-2037"
},
{
"cve": "CVE-2016-2073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2073"
}
],
"notes": [
{
"category": "general",
"text": "The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2073",
"url": "https://www.suse.com/security/cve/CVE-2016-2073"
},
{
"category": "external",
"summary": "SUSE Bug 963963 for CVE-2016-2073",
"url": "https://bugzilla.suse.com/963963"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-2073"
},
{
"cve": "CVE-2016-2105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2105"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2105",
"url": "https://www.suse.com/security/cve/CVE-2016-2105"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 977614 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/977614"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 989902 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/989902"
},
{
"category": "external",
"summary": "SUSE Bug 990369 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/990369"
},
{
"category": "external",
"summary": "SUSE Bug 990370 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/990370"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-2105"
},
{
"cve": "CVE-2016-2106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2106"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2106",
"url": "https://www.suse.com/security/cve/CVE-2016-2106"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 977615 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/977615"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 979279 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/979279"
},
{
"category": "external",
"summary": "SUSE Bug 990369 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/990369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-2106"
},
{
"cve": "CVE-2016-2107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2107"
}
],
"notes": [
{
"category": "general",
"text": "The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2107",
"url": "https://www.suse.com/security/cve/CVE-2016-2107"
},
{
"category": "external",
"summary": "SUSE Bug 976942 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/976942"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 977616 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/977616"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 990369 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/990369"
},
{
"category": "external",
"summary": "SUSE Bug 990370 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/990370"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2016-2107"
},
{
"cve": "CVE-2016-2108",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2108"
}
],
"notes": [
{
"category": "general",
"text": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2108",
"url": "https://www.suse.com/security/cve/CVE-2016-2108"
},
{
"category": "external",
"summary": "SUSE Bug 1001502 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/1001502"
},
{
"category": "external",
"summary": "SUSE Bug 1004499 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/1004499"
},
{
"category": "external",
"summary": "SUSE Bug 1005878 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/1005878"
},
{
"category": "external",
"summary": "SUSE Bug 1148697 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/1148697"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 977617 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/977617"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 989345 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/989345"
},
{
"category": "external",
"summary": "SUSE Bug 996067 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/996067"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2016-2108"
},
{
"cve": "CVE-2016-2109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2109"
}
],
"notes": [
{
"category": "general",
"text": "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2109",
"url": "https://www.suse.com/security/cve/CVE-2016-2109"
},
{
"category": "external",
"summary": "SUSE Bug 1015243 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/1015243"
},
{
"category": "external",
"summary": "SUSE Bug 976942 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/976942"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 990369 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/990369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-2109"
},
{
"cve": "CVE-2016-2177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2177"
}
],
"notes": [
{
"category": "general",
"text": "OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2177",
"url": "https://www.suse.com/security/cve/CVE-2016-2177"
},
{
"category": "external",
"summary": "SUSE Bug 982575 for CVE-2016-2177",
"url": "https://bugzilla.suse.com/982575"
},
{
"category": "external",
"summary": "SUSE Bug 999075 for CVE-2016-2177",
"url": "https://bugzilla.suse.com/999075"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2177",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2016-2177"
},
{
"cve": "CVE-2016-2178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2178"
}
],
"notes": [
{
"category": "general",
"text": "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2178",
"url": "https://www.suse.com/security/cve/CVE-2016-2178"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 983249 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/983249"
},
{
"category": "external",
"summary": "SUSE Bug 983519 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/983519"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-2178"
},
{
"cve": "CVE-2016-2179",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2179"
}
],
"notes": [
{
"category": "general",
"text": "The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2179",
"url": "https://www.suse.com/security/cve/CVE-2016-2179"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-2179",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-2179",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2179",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-2179"
},
{
"cve": "CVE-2016-2180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2180"
}
],
"notes": [
{
"category": "general",
"text": "The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the \"openssl ts\" command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2180",
"url": "https://www.suse.com/security/cve/CVE-2016-2180"
},
{
"category": "external",
"summary": "SUSE Bug 1003811 for CVE-2016-2180",
"url": "https://bugzilla.suse.com/1003811"
},
{
"category": "external",
"summary": "SUSE Bug 990419 for CVE-2016-2180",
"url": "https://bugzilla.suse.com/990419"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2180",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-2180"
},
{
"cve": "CVE-2016-2181",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2181"
}
],
"notes": [
{
"category": "general",
"text": "The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2181",
"url": "https://www.suse.com/security/cve/CVE-2016-2181"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-2181",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 994749 for CVE-2016-2181",
"url": "https://bugzilla.suse.com/994749"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-2181",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2181",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-2181"
},
{
"cve": "CVE-2016-2182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2182"
}
],
"notes": [
{
"category": "general",
"text": "The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2182",
"url": "https://www.suse.com/security/cve/CVE-2016-2182"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 993819 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/993819"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 995959 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/995959"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-2182"
},
{
"cve": "CVE-2016-2183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2183"
}
],
"notes": [
{
"category": "general",
"text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2183",
"url": "https://www.suse.com/security/cve/CVE-2016-2183"
},
{
"category": "external",
"summary": "SUSE Bug 1001912 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1001912"
},
{
"category": "external",
"summary": "SUSE Bug 1024218 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1024218"
},
{
"category": "external",
"summary": "SUSE Bug 1027038 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1027038"
},
{
"category": "external",
"summary": "SUSE Bug 1034689 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1034689"
},
{
"category": "external",
"summary": "SUSE Bug 1056614 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1056614"
},
{
"category": "external",
"summary": "SUSE Bug 1171693 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1171693"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 995359 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/995359"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-2183"
},
{
"cve": "CVE-2016-2381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2381"
}
],
"notes": [
{
"category": "general",
"text": "Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2381",
"url": "https://www.suse.com/security/cve/CVE-2016-2381"
},
{
"category": "external",
"summary": "SUSE Bug 967082 for CVE-2016-2381",
"url": "https://bugzilla.suse.com/967082"
},
{
"category": "external",
"summary": "SUSE Bug 992991 for CVE-2016-2381",
"url": "https://bugzilla.suse.com/992991"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-2381"
},
{
"cve": "CVE-2016-3075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3075"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3075",
"url": "https://www.suse.com/security/cve/CVE-2016-3075"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2016-3075",
"url": "https://bugzilla.suse.com/1123874"
},
{
"category": "external",
"summary": "SUSE Bug 973164 for CVE-2016-3075",
"url": "https://bugzilla.suse.com/973164"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-3075"
},
{
"cve": "CVE-2016-3191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3191"
}
],
"notes": [
{
"category": "general",
"text": "The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3191",
"url": "https://www.suse.com/security/cve/CVE-2016-3191"
},
{
"category": "external",
"summary": "SUSE Bug 971741 for CVE-2016-3191",
"url": "https://bugzilla.suse.com/971741"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-3191"
},
{
"cve": "CVE-2016-3627",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3627"
}
],
"notes": [
{
"category": "general",
"text": "The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3627",
"url": "https://www.suse.com/security/cve/CVE-2016-3627"
},
{
"category": "external",
"summary": "SUSE Bug 1026099 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/1026099"
},
{
"category": "external",
"summary": "SUSE Bug 1026101 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/1026101"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 972335 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/972335"
},
{
"category": "external",
"summary": "SUSE Bug 975947 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/975947"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-3627"
},
{
"cve": "CVE-2016-3705",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3705"
}
],
"notes": [
{
"category": "general",
"text": "The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3705",
"url": "https://www.suse.com/security/cve/CVE-2016-3705"
},
{
"category": "external",
"summary": "SUSE Bug 1017497 for CVE-2016-3705",
"url": "https://bugzilla.suse.com/1017497"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-3705",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 975947 for CVE-2016-3705",
"url": "https://bugzilla.suse.com/975947"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2016-3705"
},
{
"cve": "CVE-2016-3706",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3706"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3706",
"url": "https://www.suse.com/security/cve/CVE-2016-3706"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2016-3706",
"url": "https://bugzilla.suse.com/1123874"
},
{
"category": "external",
"summary": "SUSE Bug 980483 for CVE-2016-3706",
"url": "https://bugzilla.suse.com/980483"
},
{
"category": "external",
"summary": "SUSE Bug 997423 for CVE-2016-3706",
"url": "https://bugzilla.suse.com/997423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-3706"
},
{
"cve": "CVE-2016-4008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4008"
}
],
"notes": [
{
"category": "general",
"text": "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4008",
"url": "https://www.suse.com/security/cve/CVE-2016-4008"
},
{
"category": "external",
"summary": "SUSE Bug 982779 for CVE-2016-4008",
"url": "https://bugzilla.suse.com/982779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-4008"
},
{
"cve": "CVE-2016-4429",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4429"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4429",
"url": "https://www.suse.com/security/cve/CVE-2016-4429"
},
{
"category": "external",
"summary": "SUSE Bug 1081556 for CVE-2016-4429",
"url": "https://bugzilla.suse.com/1081556"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2016-4429",
"url": "https://bugzilla.suse.com/1123874"
},
{
"category": "external",
"summary": "SUSE Bug 980854 for CVE-2016-4429",
"url": "https://bugzilla.suse.com/980854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-4429"
},
{
"cve": "CVE-2016-4447",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4447"
}
],
"notes": [
{
"category": "general",
"text": "The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4447",
"url": "https://www.suse.com/security/cve/CVE-2016-4447"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4447",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981548 for CVE-2016-4447",
"url": "https://bugzilla.suse.com/981548"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-4447"
},
{
"cve": "CVE-2016-4448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4448"
}
],
"notes": [
{
"category": "general",
"text": "Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4448",
"url": "https://www.suse.com/security/cve/CVE-2016-4448"
},
{
"category": "external",
"summary": "SUSE Bug 1010299 for CVE-2016-4448",
"url": "https://bugzilla.suse.com/1010299"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4448",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981549 for CVE-2016-4448",
"url": "https://bugzilla.suse.com/981549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-4448"
},
{
"cve": "CVE-2016-4449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4449"
}
],
"notes": [
{
"category": "general",
"text": "XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4449",
"url": "https://www.suse.com/security/cve/CVE-2016-4449"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4449",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981550 for CVE-2016-4449",
"url": "https://bugzilla.suse.com/981550"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-4449"
},
{
"cve": "CVE-2016-4483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4483"
}
],
"notes": [
{
"category": "general",
"text": "The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4483",
"url": "https://www.suse.com/security/cve/CVE-2016-4483"
},
{
"category": "external",
"summary": "SUSE Bug 1026101 for CVE-2016-4483",
"url": "https://bugzilla.suse.com/1026101"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4483",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 978395 for CVE-2016-4483",
"url": "https://bugzilla.suse.com/978395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-4483"
},
{
"cve": "CVE-2016-4574",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4574"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4574",
"url": "https://www.suse.com/security/cve/CVE-2016-4574"
},
{
"category": "external",
"summary": "SUSE Bug 1135436 for CVE-2016-4574",
"url": "https://bugzilla.suse.com/1135436"
},
{
"category": "external",
"summary": "SUSE Bug 979261 for CVE-2016-4574",
"url": "https://bugzilla.suse.com/979261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2016-4574"
},
{
"cve": "CVE-2016-4579",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4579"
}
],
"notes": [
{
"category": "general",
"text": "Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the \"returned length of the object from _ksba_ber_parse_tl.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4579",
"url": "https://www.suse.com/security/cve/CVE-2016-4579"
},
{
"category": "external",
"summary": "SUSE Bug 1135436 for CVE-2016-4579",
"url": "https://bugzilla.suse.com/1135436"
},
{
"category": "external",
"summary": "SUSE Bug 979906 for CVE-2016-4579",
"url": "https://bugzilla.suse.com/979906"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-4579"
},
{
"cve": "CVE-2016-4658",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4658"
}
],
"notes": [
{
"category": "general",
"text": "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4658",
"url": "https://www.suse.com/security/cve/CVE-2016-4658"
},
{
"category": "external",
"summary": "SUSE Bug 1005544 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1005544"
},
{
"category": "external",
"summary": "SUSE Bug 1014873 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1014873"
},
{
"category": "external",
"summary": "SUSE Bug 1069433 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1069433"
},
{
"category": "external",
"summary": "SUSE Bug 1078813 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1078813"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-4658"
},
{
"cve": "CVE-2016-5011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5011"
}
],
"notes": [
{
"category": "general",
"text": "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5011",
"url": "https://www.suse.com/security/cve/CVE-2016-5011"
},
{
"category": "external",
"summary": "SUSE Bug 988361 for CVE-2016-5011",
"url": "https://bugzilla.suse.com/988361"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-5011"
},
{
"cve": "CVE-2016-5300",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5300"
}
],
"notes": [
{
"category": "general",
"text": "The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5300",
"url": "https://www.suse.com/security/cve/CVE-2016-5300"
},
{
"category": "external",
"summary": "SUSE Bug 983216 for CVE-2016-5300",
"url": "https://bugzilla.suse.com/983216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2016-5300"
},
{
"cve": "CVE-2016-5419",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5419"
}
],
"notes": [
{
"category": "general",
"text": "curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5419",
"url": "https://www.suse.com/security/cve/CVE-2016-5419"
},
{
"category": "external",
"summary": "SUSE Bug 1033413 for CVE-2016-5419",
"url": "https://bugzilla.suse.com/1033413"
},
{
"category": "external",
"summary": "SUSE Bug 1033442 for CVE-2016-5419",
"url": "https://bugzilla.suse.com/1033442"
},
{
"category": "external",
"summary": "SUSE Bug 991389 for CVE-2016-5419",
"url": "https://bugzilla.suse.com/991389"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-5419"
},
{
"cve": "CVE-2016-5420",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5420"
}
],
"notes": [
{
"category": "general",
"text": "curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5420",
"url": "https://www.suse.com/security/cve/CVE-2016-5420"
},
{
"category": "external",
"summary": "SUSE Bug 991390 for CVE-2016-5420",
"url": "https://bugzilla.suse.com/991390"
},
{
"category": "external",
"summary": "SUSE Bug 997420 for CVE-2016-5420",
"url": "https://bugzilla.suse.com/997420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-5420"
},
{
"cve": "CVE-2016-5421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5421"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5421",
"url": "https://www.suse.com/security/cve/CVE-2016-5421"
},
{
"category": "external",
"summary": "SUSE Bug 991391 for CVE-2016-5421",
"url": "https://bugzilla.suse.com/991391"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-5421"
},
{
"cve": "CVE-2016-6185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6185"
}
],
"notes": [
{
"category": "general",
"text": "The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6185",
"url": "https://www.suse.com/security/cve/CVE-2016-6185"
},
{
"category": "external",
"summary": "SUSE Bug 988311 for CVE-2016-6185",
"url": "https://bugzilla.suse.com/988311"
},
{
"category": "external",
"summary": "SUSE Bug 999993 for CVE-2016-6185",
"url": "https://bugzilla.suse.com/999993"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-6185"
},
{
"cve": "CVE-2016-6261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6261"
}
],
"notes": [
{
"category": "general",
"text": "The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6261",
"url": "https://www.suse.com/security/cve/CVE-2016-6261"
},
{
"category": "external",
"summary": "SUSE Bug 1118435 for CVE-2016-6261",
"url": "https://bugzilla.suse.com/1118435"
},
{
"category": "external",
"summary": "SUSE Bug 1173590 for CVE-2016-6261",
"url": "https://bugzilla.suse.com/1173590"
},
{
"category": "external",
"summary": "SUSE Bug 990190 for CVE-2016-6261",
"url": "https://bugzilla.suse.com/990190"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-6261"
},
{
"cve": "CVE-2016-6262",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6262"
}
],
"notes": [
{
"category": "general",
"text": "idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6262",
"url": "https://www.suse.com/security/cve/CVE-2016-6262"
},
{
"category": "external",
"summary": "SUSE Bug 1014473 for CVE-2016-6262",
"url": "https://bugzilla.suse.com/1014473"
},
{
"category": "external",
"summary": "SUSE Bug 1173590 for CVE-2016-6262",
"url": "https://bugzilla.suse.com/1173590"
},
{
"category": "external",
"summary": "SUSE Bug 1190777 for CVE-2016-6262",
"url": "https://bugzilla.suse.com/1190777"
},
{
"category": "external",
"summary": "SUSE Bug 990189 for CVE-2016-6262",
"url": "https://bugzilla.suse.com/990189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-6262"
},
{
"cve": "CVE-2016-6263",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6263"
}
],
"notes": [
{
"category": "general",
"text": "The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6263",
"url": "https://www.suse.com/security/cve/CVE-2016-6263"
},
{
"category": "external",
"summary": "SUSE Bug 1118435 for CVE-2016-6263",
"url": "https://bugzilla.suse.com/1118435"
},
{
"category": "external",
"summary": "SUSE Bug 990191 for CVE-2016-6263",
"url": "https://bugzilla.suse.com/990191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-6263"
},
{
"cve": "CVE-2016-6302",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6302"
}
],
"notes": [
{
"category": "general",
"text": "The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6302",
"url": "https://www.suse.com/security/cve/CVE-2016-6302"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-6302",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-6302",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 995324 for CVE-2016-6302",
"url": "https://bugzilla.suse.com/995324"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-6302",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-6302"
},
{
"cve": "CVE-2016-6303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6303"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6303",
"url": "https://www.suse.com/security/cve/CVE-2016-6303"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 995377 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/995377"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-6303"
},
{
"cve": "CVE-2016-6304",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6304"
}
],
"notes": [
{
"category": "general",
"text": "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6304",
"url": "https://www.suse.com/security/cve/CVE-2016-6304"
},
{
"category": "external",
"summary": "SUSE Bug 1001706 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1001706"
},
{
"category": "external",
"summary": "SUSE Bug 1003811 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1003811"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 1005579 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1005579"
},
{
"category": "external",
"summary": "SUSE Bug 1021375 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1021375"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/999665"
},
{
"category": "external",
"summary": "SUSE Bug 999666 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/999666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-6304"
},
{
"cve": "CVE-2016-6306",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6306"
}
],
"notes": [
{
"category": "general",
"text": "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6306",
"url": "https://www.suse.com/security/cve/CVE-2016-6306"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-6306",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-6306",
"url": "https://bugzilla.suse.com/999665"
},
{
"category": "external",
"summary": "SUSE Bug 999668 for CVE-2016-6306",
"url": "https://bugzilla.suse.com/999668"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-6306"
},
{
"cve": "CVE-2016-6313",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6313"
}
],
"notes": [
{
"category": "general",
"text": "The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6313",
"url": "https://www.suse.com/security/cve/CVE-2016-6313"
},
{
"category": "external",
"summary": "SUSE Bug 1123792 for CVE-2016-6313",
"url": "https://bugzilla.suse.com/1123792"
},
{
"category": "external",
"summary": "SUSE Bug 994157 for CVE-2016-6313",
"url": "https://bugzilla.suse.com/994157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-6313"
},
{
"cve": "CVE-2016-6318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6318"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6318",
"url": "https://www.suse.com/security/cve/CVE-2016-6318"
},
{
"category": "external",
"summary": "SUSE Bug 1123113 for CVE-2016-6318",
"url": "https://bugzilla.suse.com/1123113"
},
{
"category": "external",
"summary": "SUSE Bug 992966 for CVE-2016-6318",
"url": "https://bugzilla.suse.com/992966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-6318"
},
{
"cve": "CVE-2016-7141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7141"
}
],
"notes": [
{
"category": "general",
"text": "curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7141",
"url": "https://www.suse.com/security/cve/CVE-2016-7141"
},
{
"category": "external",
"summary": "SUSE Bug 991390 for CVE-2016-7141",
"url": "https://bugzilla.suse.com/991390"
},
{
"category": "external",
"summary": "SUSE Bug 997420 for CVE-2016-7141",
"url": "https://bugzilla.suse.com/997420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-7141"
},
{
"cve": "CVE-2016-7167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7167"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7167",
"url": "https://www.suse.com/security/cve/CVE-2016-7167"
},
{
"category": "external",
"summary": "SUSE Bug 998760 for CVE-2016-7167",
"url": "https://bugzilla.suse.com/998760"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-7167"
},
{
"cve": "CVE-2016-7543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7543"
}
],
"notes": [
{
"category": "general",
"text": "Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7543",
"url": "https://www.suse.com/security/cve/CVE-2016-7543"
},
{
"category": "external",
"summary": "SUSE Bug 1001299 for CVE-2016-7543",
"url": "https://bugzilla.suse.com/1001299"
},
{
"category": "external",
"summary": "SUSE Bug 1159416 for CVE-2016-7543",
"url": "https://bugzilla.suse.com/1159416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-7543"
},
{
"cve": "CVE-2016-7796",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7796"
}
],
"notes": [
{
"category": "general",
"text": "The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7796",
"url": "https://www.suse.com/security/cve/CVE-2016-7796"
},
{
"category": "external",
"summary": "SUSE Bug 1001765 for CVE-2016-7796",
"url": "https://bugzilla.suse.com/1001765"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-7796"
},
{
"cve": "CVE-2016-8615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8615"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8615",
"url": "https://www.suse.com/security/cve/CVE-2016-8615"
},
{
"category": "external",
"summary": "SUSE Bug 1005633 for CVE-2016-8615",
"url": "https://bugzilla.suse.com/1005633"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-8615"
},
{
"cve": "CVE-2016-8616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8616"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8616",
"url": "https://www.suse.com/security/cve/CVE-2016-8616"
},
{
"category": "external",
"summary": "SUSE Bug 1005634 for CVE-2016-8616",
"url": "https://bugzilla.suse.com/1005634"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-8616"
},
{
"cve": "CVE-2016-8617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8617"
}
],
"notes": [
{
"category": "general",
"text": "The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8617",
"url": "https://www.suse.com/security/cve/CVE-2016-8617"
},
{
"category": "external",
"summary": "SUSE Bug 1005635 for CVE-2016-8617",
"url": "https://bugzilla.suse.com/1005635"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-8617"
},
{
"cve": "CVE-2016-8618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8618"
}
],
"notes": [
{
"category": "general",
"text": "The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8618",
"url": "https://www.suse.com/security/cve/CVE-2016-8618"
},
{
"category": "external",
"summary": "SUSE Bug 1005637 for CVE-2016-8618",
"url": "https://bugzilla.suse.com/1005637"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-8618"
},
{
"cve": "CVE-2016-8619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8619"
}
],
"notes": [
{
"category": "general",
"text": "The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8619",
"url": "https://www.suse.com/security/cve/CVE-2016-8619"
},
{
"category": "external",
"summary": "SUSE Bug 1005638 for CVE-2016-8619",
"url": "https://bugzilla.suse.com/1005638"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-8619"
},
{
"cve": "CVE-2016-8620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8620"
}
],
"notes": [
{
"category": "general",
"text": "The \u0027globbing\u0027 feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8620",
"url": "https://www.suse.com/security/cve/CVE-2016-8620"
},
{
"category": "external",
"summary": "SUSE Bug 1005640 for CVE-2016-8620",
"url": "https://bugzilla.suse.com/1005640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-8620"
},
{
"cve": "CVE-2016-8621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8621"
}
],
"notes": [
{
"category": "general",
"text": "The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8621",
"url": "https://www.suse.com/security/cve/CVE-2016-8621"
},
{
"category": "external",
"summary": "SUSE Bug 1005642 for CVE-2016-8621",
"url": "https://bugzilla.suse.com/1005642"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-8621"
},
{
"cve": "CVE-2016-8622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8622"
}
],
"notes": [
{
"category": "general",
"text": "The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8622",
"url": "https://www.suse.com/security/cve/CVE-2016-8622"
},
{
"category": "external",
"summary": "SUSE Bug 1005643 for CVE-2016-8622",
"url": "https://bugzilla.suse.com/1005643"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-8622"
},
{
"cve": "CVE-2016-8623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8623"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8623",
"url": "https://www.suse.com/security/cve/CVE-2016-8623"
},
{
"category": "external",
"summary": "SUSE Bug 1005645 for CVE-2016-8623",
"url": "https://bugzilla.suse.com/1005645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-8623"
},
{
"cve": "CVE-2016-8624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8624"
}
],
"notes": [
{
"category": "general",
"text": "curl before version 7.51.0 doesn\u0027t parse the authority component of the URL correctly when the host name part ends with a \u0027#\u0027 character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8624",
"url": "https://www.suse.com/security/cve/CVE-2016-8624"
},
{
"category": "external",
"summary": "SUSE Bug 1005646 for CVE-2016-8624",
"url": "https://bugzilla.suse.com/1005646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-8624"
},
{
"cve": "CVE-2016-9063",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9063"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox \u003c 50.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9063",
"url": "https://www.suse.com/security/cve/CVE-2016-9063"
},
{
"category": "external",
"summary": "SUSE Bug 1009026 for CVE-2016-9063",
"url": "https://bugzilla.suse.com/1009026"
},
{
"category": "external",
"summary": "SUSE Bug 1010424 for CVE-2016-9063",
"url": "https://bugzilla.suse.com/1010424"
},
{
"category": "external",
"summary": "SUSE Bug 1047240 for CVE-2016-9063",
"url": "https://bugzilla.suse.com/1047240"
},
{
"category": "external",
"summary": "SUSE Bug 1123115 for CVE-2016-9063",
"url": "https://bugzilla.suse.com/1123115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2016-9063"
},
{
"cve": "CVE-2016-9318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9318"
}
],
"notes": [
{
"category": "general",
"text": "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9318",
"url": "https://www.suse.com/security/cve/CVE-2016-9318"
},
{
"category": "external",
"summary": "SUSE Bug 1010675 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1010675"
},
{
"category": "external",
"summary": "SUSE Bug 1014873 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1014873"
},
{
"category": "external",
"summary": "SUSE Bug 1019074 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1019074"
},
{
"category": "external",
"summary": "SUSE Bug 1118959 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1118959"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 1126613 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1126613"
},
{
"category": "external",
"summary": "SUSE Bug 1148896 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1148896"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-9318"
},
{
"cve": "CVE-2016-9586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9586"
}
],
"notes": [
{
"category": "general",
"text": "curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl\u0027s implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9586",
"url": "https://www.suse.com/security/cve/CVE-2016-9586"
},
{
"category": "external",
"summary": "SUSE Bug 1015332 for CVE-2016-9586",
"url": "https://bugzilla.suse.com/1015332"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-9586"
},
{
"cve": "CVE-2016-9597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9597"
}
],
"notes": [
{
"category": "general",
"text": "It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression CVE for the same issue as CVE-2016-3705.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9597",
"url": "https://www.suse.com/security/cve/CVE-2016-9597"
},
{
"category": "external",
"summary": "SUSE Bug 1014873 for CVE-2016-9597",
"url": "https://bugzilla.suse.com/1014873"
},
{
"category": "external",
"summary": "SUSE Bug 1017497 for CVE-2016-9597",
"url": "https://bugzilla.suse.com/1017497"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-9597",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-9597"
},
{
"cve": "CVE-2016-9840",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9840"
}
],
"notes": [
{
"category": "general",
"text": "inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9840",
"url": "https://www.suse.com/security/cve/CVE-2016-9840"
},
{
"category": "external",
"summary": "SUSE Bug 1003579 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1003579"
},
{
"category": "external",
"summary": "SUSE Bug 1022633 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1022633"
},
{
"category": "external",
"summary": "SUSE Bug 1023215 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1023215"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1038505"
},
{
"category": "external",
"summary": "SUSE Bug 1062104 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1062104"
},
{
"category": "external",
"summary": "SUSE Bug 1120866 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1120866"
},
{
"category": "external",
"summary": "SUSE Bug 1123150 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1123150"
},
{
"category": "external",
"summary": "SUSE Bug 1127473 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1127473"
},
{
"category": "external",
"summary": "SUSE Bug 1184301 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1184301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2016-9840"
},
{
"cve": "CVE-2016-9841",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9841"
}
],
"notes": [
{
"category": "general",
"text": "inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9841",
"url": "https://www.suse.com/security/cve/CVE-2016-9841"
},
{
"category": "external",
"summary": "SUSE Bug 1003579 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1003579"
},
{
"category": "external",
"summary": "SUSE Bug 1022633 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1022633"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1038505"
},
{
"category": "external",
"summary": "SUSE Bug 1064070 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1064070"
},
{
"category": "external",
"summary": "SUSE Bug 1070162 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1070162"
},
{
"category": "external",
"summary": "SUSE Bug 1120866 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1120866"
},
{
"category": "external",
"summary": "SUSE Bug 1123150 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1123150"
},
{
"category": "external",
"summary": "SUSE Bug 1127473 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1127473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2016-9841"
},
{
"cve": "CVE-2016-9842",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9842"
}
],
"notes": [
{
"category": "general",
"text": "The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9842",
"url": "https://www.suse.com/security/cve/CVE-2016-9842"
},
{
"category": "external",
"summary": "SUSE Bug 1003580 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1003580"
},
{
"category": "external",
"summary": "SUSE Bug 1022633 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1022633"
},
{
"category": "external",
"summary": "SUSE Bug 1023215 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1023215"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1038505"
},
{
"category": "external",
"summary": "SUSE Bug 1062104 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1062104"
},
{
"category": "external",
"summary": "SUSE Bug 1120866 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1120866"
},
{
"category": "external",
"summary": "SUSE Bug 1123150 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1123150"
},
{
"category": "external",
"summary": "SUSE Bug 1127473 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1127473"
},
{
"category": "external",
"summary": "SUSE Bug 1184301 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1184301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-9842"
},
{
"cve": "CVE-2016-9843",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9843"
}
],
"notes": [
{
"category": "general",
"text": "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9843",
"url": "https://www.suse.com/security/cve/CVE-2016-9843"
},
{
"category": "external",
"summary": "SUSE Bug 1003580 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1003580"
},
{
"category": "external",
"summary": "SUSE Bug 1013882 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1013882"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1038505"
},
{
"category": "external",
"summary": "SUSE Bug 1062104 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1062104"
},
{
"category": "external",
"summary": "SUSE Bug 1116686 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1116686"
},
{
"category": "external",
"summary": "SUSE Bug 1120866 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1120866"
},
{
"category": "external",
"summary": "SUSE Bug 1123150 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1123150"
},
{
"category": "external",
"summary": "SUSE Bug 1127473 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1127473"
},
{
"category": "external",
"summary": "SUSE Bug 1184301 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1184301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-9843"
},
{
"cve": "CVE-2017-1000100",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000100"
}
],
"notes": [
{
"category": "general",
"text": "When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn\u0027t restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl\u0027s redirect protocols with --proto-redir and libcurl\u0027s with CURLOPT_REDIR_PROTOCOLS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000100",
"url": "https://www.suse.com/security/cve/CVE-2017-1000100"
},
{
"category": "external",
"summary": "SUSE Bug 1051644 for CVE-2017-1000100",
"url": "https://bugzilla.suse.com/1051644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-1000100"
},
{
"cve": "CVE-2017-1000101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000101"
}
],
"notes": [
{
"category": "general",
"text": "curl supports \"globbing\" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000101",
"url": "https://www.suse.com/security/cve/CVE-2017-1000101"
},
{
"category": "external",
"summary": "SUSE Bug 1051643 for CVE-2017-1000101",
"url": "https://bugzilla.suse.com/1051643"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-1000101"
},
{
"cve": "CVE-2017-1000366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000366"
}
],
"notes": [
{
"category": "general",
"text": "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000366",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366"
},
{
"category": "external",
"summary": "SUSE Bug 1037551 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1037551"
},
{
"category": "external",
"summary": "SUSE Bug 1039357 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1039357"
},
{
"category": "external",
"summary": "SUSE Bug 1063847 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1063847"
},
{
"category": "external",
"summary": "SUSE Bug 1071319 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1071319"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1123874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2017-1000366"
},
{
"cve": "CVE-2017-10684",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10684"
}
],
"notes": [
{
"category": "general",
"text": "In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10684",
"url": "https://www.suse.com/security/cve/CVE-2017-10684"
},
{
"category": "external",
"summary": "SUSE Bug 1046858 for CVE-2017-10684",
"url": "https://bugzilla.suse.com/1046858"
},
{
"category": "external",
"summary": "SUSE Bug 1115932 for CVE-2017-10684",
"url": "https://bugzilla.suse.com/1115932"
},
{
"category": "external",
"summary": "SUSE Bug 1175501 for CVE-2017-10684",
"url": "https://bugzilla.suse.com/1175501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-10684"
},
{
"cve": "CVE-2017-10685",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10685"
}
],
"notes": [
{
"category": "general",
"text": "In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10685",
"url": "https://www.suse.com/security/cve/CVE-2017-10685"
},
{
"category": "external",
"summary": "SUSE Bug 1046853 for CVE-2017-10685",
"url": "https://bugzilla.suse.com/1046853"
},
{
"category": "external",
"summary": "SUSE Bug 1115932 for CVE-2017-10685",
"url": "https://bugzilla.suse.com/1115932"
},
{
"category": "external",
"summary": "SUSE Bug 1175501 for CVE-2017-10685",
"url": "https://bugzilla.suse.com/1175501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-10685"
},
{
"cve": "CVE-2017-11112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11112"
}
],
"notes": [
{
"category": "general",
"text": "In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11112",
"url": "https://www.suse.com/security/cve/CVE-2017-11112"
},
{
"category": "external",
"summary": "SUSE Bug 1046853 for CVE-2017-11112",
"url": "https://bugzilla.suse.com/1046853"
},
{
"category": "external",
"summary": "SUSE Bug 1047964 for CVE-2017-11112",
"url": "https://bugzilla.suse.com/1047964"
},
{
"category": "external",
"summary": "SUSE Bug 1175501 for CVE-2017-11112",
"url": "https://bugzilla.suse.com/1175501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-11112"
},
{
"cve": "CVE-2017-11113",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11113"
}
],
"notes": [
{
"category": "general",
"text": "In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11113",
"url": "https://www.suse.com/security/cve/CVE-2017-11113"
},
{
"category": "external",
"summary": "SUSE Bug 1046853 for CVE-2017-11113",
"url": "https://bugzilla.suse.com/1046853"
},
{
"category": "external",
"summary": "SUSE Bug 1047965 for CVE-2017-11113",
"url": "https://bugzilla.suse.com/1047965"
},
{
"category": "external",
"summary": "SUSE Bug 1175501 for CVE-2017-11113",
"url": "https://bugzilla.suse.com/1175501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-11113"
},
{
"cve": "CVE-2017-2616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2616"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2616",
"url": "https://www.suse.com/security/cve/CVE-2017-2616"
},
{
"category": "external",
"summary": "SUSE Bug 1023041 for CVE-2017-2616",
"url": "https://bugzilla.suse.com/1023041"
},
{
"category": "external",
"summary": "SUSE Bug 1123789 for CVE-2017-2616",
"url": "https://bugzilla.suse.com/1123789"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2017-2616"
},
{
"cve": "CVE-2017-6507",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6507"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle \u0027restart\u0027 operations removing AppArmor profiles that aren\u0027t found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what\u0027s done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6507",
"url": "https://www.suse.com/security/cve/CVE-2017-6507"
},
{
"category": "external",
"summary": "SUSE Bug 1029696 for CVE-2017-6507",
"url": "https://bugzilla.suse.com/1029696"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-6507"
},
{
"cve": "CVE-2017-7407",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7407"
}
],
"notes": [
{
"category": "general",
"text": "The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a \u0027%\u0027 character, which leads to a heap-based buffer over-read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7407",
"url": "https://www.suse.com/security/cve/CVE-2017-7407"
},
{
"category": "external",
"summary": "SUSE Bug 1032309 for CVE-2017-7407",
"url": "https://bugzilla.suse.com/1032309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2017-7407"
},
{
"cve": "CVE-2017-7526",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7526"
}
],
"notes": [
{
"category": "general",
"text": "libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7526",
"url": "https://www.suse.com/security/cve/CVE-2017-7526"
},
{
"category": "external",
"summary": "SUSE Bug 1046607 for CVE-2017-7526",
"url": "https://bugzilla.suse.com/1046607"
},
{
"category": "external",
"summary": "SUSE Bug 1047462 for CVE-2017-7526",
"url": "https://bugzilla.suse.com/1047462"
},
{
"category": "external",
"summary": "SUSE Bug 1123792 for CVE-2017-7526",
"url": "https://bugzilla.suse.com/1123792"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2017-7526"
},
{
"cve": "CVE-2017-9047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9047"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. The variable len is assigned strlen(buf). If the content-\u003etype is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content-\u003eprefix is appended to buf (if it actually fits) whereupon (ii) content-\u003ename is written to the buffer. However, the check for whether the content-\u003ename actually fits also uses \u0027len\u0027 rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9047",
"url": "https://www.suse.com/security/cve/CVE-2017-9047"
},
{
"category": "external",
"summary": "SUSE Bug 1039063 for CVE-2017-9047",
"url": "https://bugzilla.suse.com/1039063"
},
{
"category": "external",
"summary": "SUSE Bug 1039066 for CVE-2017-9047",
"url": "https://bugzilla.suse.com/1039066"
},
{
"category": "external",
"summary": "SUSE Bug 1039657 for CVE-2017-9047",
"url": "https://bugzilla.suse.com/1039657"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2017-9047",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-9047"
},
{
"cve": "CVE-2017-9048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9048"
}
],
"notes": [
{
"category": "general",
"text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 \u003c size. This vulnerability causes programs that use libxml2, such as PHP, to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9048",
"url": "https://www.suse.com/security/cve/CVE-2017-9048"
},
{
"category": "external",
"summary": "SUSE Bug 1039064 for CVE-2017-9048",
"url": "https://bugzilla.suse.com/1039064"
},
{
"category": "external",
"summary": "SUSE Bug 1039066 for CVE-2017-9048",
"url": "https://bugzilla.suse.com/1039066"
},
{
"category": "external",
"summary": "SUSE Bug 1039658 for CVE-2017-9048",
"url": "https://bugzilla.suse.com/1039658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-9048"
},
{
"cve": "CVE-2017-9049",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9049"
}
],
"notes": [
{
"category": "general",
"text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9049",
"url": "https://www.suse.com/security/cve/CVE-2017-9049"
},
{
"category": "external",
"summary": "SUSE Bug 1039063 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039063"
},
{
"category": "external",
"summary": "SUSE Bug 1039064 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039064"
},
{
"category": "external",
"summary": "SUSE Bug 1039066 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039066"
},
{
"category": "external",
"summary": "SUSE Bug 1039659 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039659"
},
{
"category": "external",
"summary": "SUSE Bug 1039661 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039661"
},
{
"category": "external",
"summary": "SUSE Bug 1069690 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1069690"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2017-9049"
},
{
"cve": "CVE-2017-9050",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9050"
}
],
"notes": [
{
"category": "general",
"text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9050",
"url": "https://www.suse.com/security/cve/CVE-2017-9050"
},
{
"category": "external",
"summary": "SUSE Bug 1039066 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1039066"
},
{
"category": "external",
"summary": "SUSE Bug 1039069 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1039069"
},
{
"category": "external",
"summary": "SUSE Bug 1039661 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1039661"
},
{
"category": "external",
"summary": "SUSE Bug 1069433 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1069433"
},
{
"category": "external",
"summary": "SUSE Bug 1069690 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1069690"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-9050"
},
{
"cve": "CVE-2017-9233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9233"
}
],
"notes": [
{
"category": "general",
"text": "XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9233",
"url": "https://www.suse.com/security/cve/CVE-2017-9233"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1047236 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/1047236"
},
{
"category": "external",
"summary": "SUSE Bug 1073350 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/1073350"
},
{
"category": "external",
"summary": "SUSE Bug 1123115 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/1123115"
},
{
"category": "external",
"summary": "SUSE Bug 983216 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/983216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2017-9233"
}
]
}
SUSE-SU-2017:1614-1
Vulnerability from csaf_suse - Published: 2017-06-19 15:19 - Updated: 2017-06-19 15:19Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for glibc",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for glibc fixes the following issues:\n\n- CVE-2017-1000366: Fix a potential privilege escalation vulnerability that\n allowed unprivileged system users to manipulate the stack of setuid binaries\n to gain special privileges. [bsc#1039357]\n\n- The incorrectly defined constant O_TMPFILE has been fixed. [bsc#1038690]\n\n- An incorrectly specified buffer length in nscd netgroup queries has been\n fixed. [bsc#986858]\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-6-2017-989,SUSE-SLE-SAP-12-SP1-2017-989,SUSE-SLE-SERVER-12-SP1-2017-989",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1614-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:1614-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171614-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:1614-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-June/002958.html"
},
{
"category": "self",
"summary": "SUSE Bug 1038690",
"url": "https://bugzilla.suse.com/1038690"
},
{
"category": "self",
"summary": "SUSE Bug 1039357",
"url": "https://bugzilla.suse.com/1039357"
},
{
"category": "self",
"summary": "SUSE Bug 986858",
"url": "https://bugzilla.suse.com/986858"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000366 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366/"
}
],
"title": "Security update for glibc",
"tracking": {
"current_release_date": "2017-06-19T15:19:43Z",
"generator": {
"date": "2017-06-19T15:19:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:1614-1",
"initial_release_date": "2017-06-19T15:19:43Z",
"revision_history": [
{
"date": "2017-06-19T15:19:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glibc-html-2.19-40.6.1.noarch",
"product": {
"name": "glibc-html-2.19-40.6.1.noarch",
"product_id": "glibc-html-2.19-40.6.1.noarch"
}
},
{
"category": "product_version",
"name": "glibc-i18ndata-2.19-40.6.1.noarch",
"product": {
"name": "glibc-i18ndata-2.19-40.6.1.noarch",
"product_id": "glibc-i18ndata-2.19-40.6.1.noarch"
}
},
{
"category": "product_version",
"name": "glibc-info-2.19-40.6.1.noarch",
"product": {
"name": "glibc-info-2.19-40.6.1.noarch",
"product_id": "glibc-info-2.19-40.6.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.19-40.6.1.ppc64le",
"product": {
"name": "glibc-2.19-40.6.1.ppc64le",
"product_id": "glibc-2.19-40.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.19-40.6.1.ppc64le",
"product": {
"name": "glibc-devel-2.19-40.6.1.ppc64le",
"product_id": "glibc-devel-2.19-40.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.19-40.6.1.ppc64le",
"product": {
"name": "glibc-locale-2.19-40.6.1.ppc64le",
"product_id": "glibc-locale-2.19-40.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-profile-2.19-40.6.1.ppc64le",
"product": {
"name": "glibc-profile-2.19-40.6.1.ppc64le",
"product_id": "glibc-profile-2.19-40.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nscd-2.19-40.6.1.ppc64le",
"product": {
"name": "nscd-2.19-40.6.1.ppc64le",
"product_id": "nscd-2.19-40.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.19-40.6.1.s390x",
"product": {
"name": "glibc-2.19-40.6.1.s390x",
"product_id": "glibc-2.19-40.6.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-32bit-2.19-40.6.1.s390x",
"product": {
"name": "glibc-32bit-2.19-40.6.1.s390x",
"product_id": "glibc-32bit-2.19-40.6.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.19-40.6.1.s390x",
"product": {
"name": "glibc-devel-2.19-40.6.1.s390x",
"product_id": "glibc-devel-2.19-40.6.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-devel-32bit-2.19-40.6.1.s390x",
"product": {
"name": "glibc-devel-32bit-2.19-40.6.1.s390x",
"product_id": "glibc-devel-32bit-2.19-40.6.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.19-40.6.1.s390x",
"product": {
"name": "glibc-locale-2.19-40.6.1.s390x",
"product_id": "glibc-locale-2.19-40.6.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-locale-32bit-2.19-40.6.1.s390x",
"product": {
"name": "glibc-locale-32bit-2.19-40.6.1.s390x",
"product_id": "glibc-locale-32bit-2.19-40.6.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-profile-2.19-40.6.1.s390x",
"product": {
"name": "glibc-profile-2.19-40.6.1.s390x",
"product_id": "glibc-profile-2.19-40.6.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-profile-32bit-2.19-40.6.1.s390x",
"product": {
"name": "glibc-profile-32bit-2.19-40.6.1.s390x",
"product_id": "glibc-profile-32bit-2.19-40.6.1.s390x"
}
},
{
"category": "product_version",
"name": "nscd-2.19-40.6.1.s390x",
"product": {
"name": "nscd-2.19-40.6.1.s390x",
"product_id": "nscd-2.19-40.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.19-40.6.1.x86_64",
"product": {
"name": "glibc-2.19-40.6.1.x86_64",
"product_id": "glibc-2.19-40.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-32bit-2.19-40.6.1.x86_64",
"product": {
"name": "glibc-32bit-2.19-40.6.1.x86_64",
"product_id": "glibc-32bit-2.19-40.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.19-40.6.1.x86_64",
"product": {
"name": "glibc-devel-2.19-40.6.1.x86_64",
"product_id": "glibc-devel-2.19-40.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-devel-32bit-2.19-40.6.1.x86_64",
"product": {
"name": "glibc-devel-32bit-2.19-40.6.1.x86_64",
"product_id": "glibc-devel-32bit-2.19-40.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.19-40.6.1.x86_64",
"product": {
"name": "glibc-locale-2.19-40.6.1.x86_64",
"product_id": "glibc-locale-2.19-40.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-locale-32bit-2.19-40.6.1.x86_64",
"product": {
"name": "glibc-locale-32bit-2.19-40.6.1.x86_64",
"product_id": "glibc-locale-32bit-2.19-40.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-profile-2.19-40.6.1.x86_64",
"product": {
"name": "glibc-profile-2.19-40.6.1.x86_64",
"product_id": "glibc-profile-2.19-40.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-profile-32bit-2.19-40.6.1.x86_64",
"product": {
"name": "glibc-profile-32bit-2.19-40.6.1.x86_64",
"product_id": "glibc-profile-32bit-2.19-40.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "nscd-2.19-40.6.1.x86_64",
"product": {
"name": "nscd-2.19-40.6.1.x86_64",
"product_id": "nscd-2.19-40.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 6",
"product": {
"name": "SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.19-40.6.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:glibc-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.19-40.6.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:glibc-32bit-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-32bit-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.19-40.6.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:glibc-devel-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-devel-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.19-40.6.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:glibc-devel-32bit-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-devel-32bit-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.19-40.6.1.noarch as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:glibc-html-2.19-40.6.1.noarch"
},
"product_reference": "glibc-html-2.19-40.6.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.19-40.6.1.noarch as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:glibc-i18ndata-2.19-40.6.1.noarch"
},
"product_reference": "glibc-i18ndata-2.19-40.6.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.19-40.6.1.noarch as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:glibc-info-2.19-40.6.1.noarch"
},
"product_reference": "glibc-info-2.19-40.6.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.19-40.6.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:glibc-locale-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-locale-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.19-40.6.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:glibc-locale-32bit-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-locale-32bit-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.19-40.6.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:glibc-profile-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-profile-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.19-40.6.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:glibc-profile-32bit-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-profile-32bit-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.19-40.6.1.x86_64 as component of SUSE OpenStack Cloud 6",
"product_id": "SUSE OpenStack Cloud 6:nscd-2.19-40.6.1.x86_64"
},
"product_reference": "nscd-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.19-40.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-2.19-40.6.1.ppc64le"
},
"product_reference": "glibc-2.19-40.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.19-40.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.19-40.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-32bit-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-32bit-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.19-40.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-devel-2.19-40.6.1.ppc64le"
},
"product_reference": "glibc-devel-2.19-40.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.19-40.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-devel-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-devel-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.19-40.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-devel-32bit-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-devel-32bit-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.19-40.6.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-html-2.19-40.6.1.noarch"
},
"product_reference": "glibc-html-2.19-40.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.19-40.6.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-i18ndata-2.19-40.6.1.noarch"
},
"product_reference": "glibc-i18ndata-2.19-40.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.19-40.6.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-info-2.19-40.6.1.noarch"
},
"product_reference": "glibc-info-2.19-40.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.19-40.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-locale-2.19-40.6.1.ppc64le"
},
"product_reference": "glibc-locale-2.19-40.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.19-40.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-locale-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-locale-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.19-40.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-locale-32bit-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-locale-32bit-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.19-40.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-profile-2.19-40.6.1.ppc64le"
},
"product_reference": "glibc-profile-2.19-40.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.19-40.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-profile-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-profile-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.19-40.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-profile-32bit-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-profile-32bit-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.19-40.6.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:nscd-2.19-40.6.1.ppc64le"
},
"product_reference": "nscd-2.19-40.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.19-40.6.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:nscd-2.19-40.6.1.x86_64"
},
"product_reference": "nscd-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.19-40.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-2.19-40.6.1.ppc64le"
},
"product_reference": "glibc-2.19-40.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.19-40.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-2.19-40.6.1.s390x"
},
"product_reference": "glibc-2.19-40.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.19-40.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.19-40.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-32bit-2.19-40.6.1.s390x"
},
"product_reference": "glibc-32bit-2.19-40.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.19-40.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-32bit-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-32bit-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.19-40.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-2.19-40.6.1.ppc64le"
},
"product_reference": "glibc-devel-2.19-40.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.19-40.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-2.19-40.6.1.s390x"
},
"product_reference": "glibc-devel-2.19-40.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.19-40.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-devel-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.19-40.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-32bit-2.19-40.6.1.s390x"
},
"product_reference": "glibc-devel-32bit-2.19-40.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.19-40.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-32bit-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-devel-32bit-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.19-40.6.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-html-2.19-40.6.1.noarch"
},
"product_reference": "glibc-html-2.19-40.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.19-40.6.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-i18ndata-2.19-40.6.1.noarch"
},
"product_reference": "glibc-i18ndata-2.19-40.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.19-40.6.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-info-2.19-40.6.1.noarch"
},
"product_reference": "glibc-info-2.19-40.6.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.19-40.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-2.19-40.6.1.ppc64le"
},
"product_reference": "glibc-locale-2.19-40.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.19-40.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-2.19-40.6.1.s390x"
},
"product_reference": "glibc-locale-2.19-40.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.19-40.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-locale-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.19-40.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-32bit-2.19-40.6.1.s390x"
},
"product_reference": "glibc-locale-32bit-2.19-40.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.19-40.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-32bit-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-locale-32bit-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.19-40.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-2.19-40.6.1.ppc64le"
},
"product_reference": "glibc-profile-2.19-40.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.19-40.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-2.19-40.6.1.s390x"
},
"product_reference": "glibc-profile-2.19-40.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.19-40.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-profile-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.19-40.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-32bit-2.19-40.6.1.s390x"
},
"product_reference": "glibc-profile-32bit-2.19-40.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.19-40.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-32bit-2.19-40.6.1.x86_64"
},
"product_reference": "glibc-profile-32bit-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.19-40.6.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:nscd-2.19-40.6.1.ppc64le"
},
"product_reference": "nscd-2.19-40.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.19-40.6.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:nscd-2.19-40.6.1.s390x"
},
"product_reference": "nscd-2.19-40.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.19-40.6.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:nscd-2.19-40.6.1.x86_64"
},
"product_reference": "nscd-2.19-40.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-1000366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000366"
}
],
"notes": [
{
"category": "general",
"text": "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-32bit-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-32bit-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-html-2.19-40.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-i18ndata-2.19-40.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-info-2.19-40.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-32bit-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-32bit-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nscd-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nscd-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nscd-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-devel-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-devel-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-devel-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-html-2.19-40.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-i18ndata-2.19-40.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-info-2.19-40.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-locale-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-locale-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-locale-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-profile-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-profile-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-profile-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:nscd-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:nscd-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-32bit-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-devel-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-devel-32bit-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-html-2.19-40.6.1.noarch",
"SUSE OpenStack Cloud 6:glibc-i18ndata-2.19-40.6.1.noarch",
"SUSE OpenStack Cloud 6:glibc-info-2.19-40.6.1.noarch",
"SUSE OpenStack Cloud 6:glibc-locale-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-locale-32bit-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-profile-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-profile-32bit-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:nscd-2.19-40.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000366",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366"
},
{
"category": "external",
"summary": "SUSE Bug 1037551 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1037551"
},
{
"category": "external",
"summary": "SUSE Bug 1039357 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1039357"
},
{
"category": "external",
"summary": "SUSE Bug 1063847 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1063847"
},
{
"category": "external",
"summary": "SUSE Bug 1071319 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1071319"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1123874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-32bit-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-32bit-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-html-2.19-40.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-i18ndata-2.19-40.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-info-2.19-40.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-32bit-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-32bit-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nscd-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nscd-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nscd-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-devel-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-devel-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-devel-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-html-2.19-40.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-i18ndata-2.19-40.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-info-2.19-40.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-locale-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-locale-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-locale-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-profile-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-profile-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-profile-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:nscd-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:nscd-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-32bit-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-devel-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-devel-32bit-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-html-2.19-40.6.1.noarch",
"SUSE OpenStack Cloud 6:glibc-i18ndata-2.19-40.6.1.noarch",
"SUSE OpenStack Cloud 6:glibc-info-2.19-40.6.1.noarch",
"SUSE OpenStack Cloud 6:glibc-locale-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-locale-32bit-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-profile-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-profile-32bit-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:nscd-2.19-40.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-32bit-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-32bit-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-devel-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-html-2.19-40.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-i18ndata-2.19-40.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-info-2.19-40.6.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-32bit-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-locale-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-32bit-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:glibc-profile-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nscd-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nscd-2.19-40.6.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:nscd-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-devel-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-devel-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-devel-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-html-2.19-40.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-i18ndata-2.19-40.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-info-2.19-40.6.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-locale-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-locale-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-locale-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-profile-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-profile-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:glibc-profile-32bit-2.19-40.6.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:nscd-2.19-40.6.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:nscd-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-32bit-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-devel-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-devel-32bit-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-html-2.19-40.6.1.noarch",
"SUSE OpenStack Cloud 6:glibc-i18ndata-2.19-40.6.1.noarch",
"SUSE OpenStack Cloud 6:glibc-info-2.19-40.6.1.noarch",
"SUSE OpenStack Cloud 6:glibc-locale-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-locale-32bit-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-profile-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:glibc-profile-32bit-2.19-40.6.1.x86_64",
"SUSE OpenStack Cloud 6:nscd-2.19-40.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-06-19T15:19:43Z",
"details": "important"
}
],
"title": "CVE-2017-1000366"
}
]
}
SUSE-SU-2017:1621-1
Vulnerability from csaf_suse - Published: 2017-06-19 19:21 - Updated: 2017-06-19 19:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for glibc",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for glibc fixes the following issues:\n\n- CVE-2017-1000366: Fix a potential privilege escalation vulnerability that\n allowed unprivileged system users to manipulate the stack of setuid binaries\n to gain special privileges. [bsc#1039357]\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "sdksp4-glibc-13158,sleposp3-glibc-13158,slessp3-glibc-13158,slessp4-glibc-13158",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1621-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:1621-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171621-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:1621-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-June/002963.html"
},
{
"category": "self",
"summary": "SUSE Bug 1039357",
"url": "https://bugzilla.suse.com/1039357"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000366 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366/"
}
],
"title": "Security update for glibc",
"tracking": {
"current_release_date": "2017-06-19T19:21:38Z",
"generator": {
"date": "2017-06-19T19:21:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:1621-1",
"initial_release_date": "2017-06-19T19:21:38Z",
"revision_history": [
{
"date": "2017-06-19T19:21:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glibc-html-2.11.3-17.109.1.i586",
"product": {
"name": "glibc-html-2.11.3-17.109.1.i586",
"product_id": "glibc-html-2.11.3-17.109.1.i586"
}
},
{
"category": "product_version",
"name": "glibc-info-2.11.3-17.109.1.i586",
"product": {
"name": "glibc-info-2.11.3-17.109.1.i586",
"product_id": "glibc-info-2.11.3-17.109.1.i586"
}
},
{
"category": "product_version",
"name": "glibc-2.11.3-17.109.1.i586",
"product": {
"name": "glibc-2.11.3-17.109.1.i586",
"product_id": "glibc-2.11.3-17.109.1.i586"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.11.3-17.109.1.i586",
"product": {
"name": "glibc-devel-2.11.3-17.109.1.i586",
"product_id": "glibc-devel-2.11.3-17.109.1.i586"
}
},
{
"category": "product_version",
"name": "glibc-i18ndata-2.11.3-17.109.1.i586",
"product": {
"name": "glibc-i18ndata-2.11.3-17.109.1.i586",
"product_id": "glibc-i18ndata-2.11.3-17.109.1.i586"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.11.3-17.109.1.i586",
"product": {
"name": "glibc-locale-2.11.3-17.109.1.i586",
"product_id": "glibc-locale-2.11.3-17.109.1.i586"
}
},
{
"category": "product_version",
"name": "glibc-profile-2.11.3-17.109.1.i586",
"product": {
"name": "glibc-profile-2.11.3-17.109.1.i586",
"product_id": "glibc-profile-2.11.3-17.109.1.i586"
}
},
{
"category": "product_version",
"name": "nscd-2.11.3-17.109.1.i586",
"product": {
"name": "nscd-2.11.3-17.109.1.i586",
"product_id": "nscd-2.11.3-17.109.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.11.3-17.109.1.i686",
"product": {
"name": "glibc-2.11.3-17.109.1.i686",
"product_id": "glibc-2.11.3-17.109.1.i686"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.11.3-17.109.1.i686",
"product": {
"name": "glibc-devel-2.11.3-17.109.1.i686",
"product_id": "glibc-devel-2.11.3-17.109.1.i686"
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.11.3-17.109.1.ia64",
"product": {
"name": "glibc-2.11.3-17.109.1.ia64",
"product_id": "glibc-2.11.3-17.109.1.ia64"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.11.3-17.109.1.ia64",
"product": {
"name": "glibc-devel-2.11.3-17.109.1.ia64",
"product_id": "glibc-devel-2.11.3-17.109.1.ia64"
}
},
{
"category": "product_version",
"name": "glibc-html-2.11.3-17.109.1.ia64",
"product": {
"name": "glibc-html-2.11.3-17.109.1.ia64",
"product_id": "glibc-html-2.11.3-17.109.1.ia64"
}
},
{
"category": "product_version",
"name": "glibc-i18ndata-2.11.3-17.109.1.ia64",
"product": {
"name": "glibc-i18ndata-2.11.3-17.109.1.ia64",
"product_id": "glibc-i18ndata-2.11.3-17.109.1.ia64"
}
},
{
"category": "product_version",
"name": "glibc-info-2.11.3-17.109.1.ia64",
"product": {
"name": "glibc-info-2.11.3-17.109.1.ia64",
"product_id": "glibc-info-2.11.3-17.109.1.ia64"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.11.3-17.109.1.ia64",
"product": {
"name": "glibc-locale-2.11.3-17.109.1.ia64",
"product_id": "glibc-locale-2.11.3-17.109.1.ia64"
}
},
{
"category": "product_version",
"name": "glibc-locale-x86-2.11.3-17.109.1.ia64",
"product": {
"name": "glibc-locale-x86-2.11.3-17.109.1.ia64",
"product_id": "glibc-locale-x86-2.11.3-17.109.1.ia64"
}
},
{
"category": "product_version",
"name": "glibc-profile-2.11.3-17.109.1.ia64",
"product": {
"name": "glibc-profile-2.11.3-17.109.1.ia64",
"product_id": "glibc-profile-2.11.3-17.109.1.ia64"
}
},
{
"category": "product_version",
"name": "glibc-profile-x86-2.11.3-17.109.1.ia64",
"product": {
"name": "glibc-profile-x86-2.11.3-17.109.1.ia64",
"product_id": "glibc-profile-x86-2.11.3-17.109.1.ia64"
}
},
{
"category": "product_version",
"name": "glibc-x86-2.11.3-17.109.1.ia64",
"product": {
"name": "glibc-x86-2.11.3-17.109.1.ia64",
"product_id": "glibc-x86-2.11.3-17.109.1.ia64"
}
},
{
"category": "product_version",
"name": "nscd-2.11.3-17.109.1.ia64",
"product": {
"name": "nscd-2.11.3-17.109.1.ia64",
"product_id": "nscd-2.11.3-17.109.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.11.3-17.109.1.ppc64",
"product": {
"name": "glibc-2.11.3-17.109.1.ppc64",
"product_id": "glibc-2.11.3-17.109.1.ppc64"
}
},
{
"category": "product_version",
"name": "glibc-32bit-2.11.3-17.109.1.ppc64",
"product": {
"name": "glibc-32bit-2.11.3-17.109.1.ppc64",
"product_id": "glibc-32bit-2.11.3-17.109.1.ppc64"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.11.3-17.109.1.ppc64",
"product": {
"name": "glibc-devel-2.11.3-17.109.1.ppc64",
"product_id": "glibc-devel-2.11.3-17.109.1.ppc64"
}
},
{
"category": "product_version",
"name": "glibc-devel-32bit-2.11.3-17.109.1.ppc64",
"product": {
"name": "glibc-devel-32bit-2.11.3-17.109.1.ppc64",
"product_id": "glibc-devel-32bit-2.11.3-17.109.1.ppc64"
}
},
{
"category": "product_version",
"name": "glibc-html-2.11.3-17.109.1.ppc64",
"product": {
"name": "glibc-html-2.11.3-17.109.1.ppc64",
"product_id": "glibc-html-2.11.3-17.109.1.ppc64"
}
},
{
"category": "product_version",
"name": "glibc-i18ndata-2.11.3-17.109.1.ppc64",
"product": {
"name": "glibc-i18ndata-2.11.3-17.109.1.ppc64",
"product_id": "glibc-i18ndata-2.11.3-17.109.1.ppc64"
}
},
{
"category": "product_version",
"name": "glibc-info-2.11.3-17.109.1.ppc64",
"product": {
"name": "glibc-info-2.11.3-17.109.1.ppc64",
"product_id": "glibc-info-2.11.3-17.109.1.ppc64"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.11.3-17.109.1.ppc64",
"product": {
"name": "glibc-locale-2.11.3-17.109.1.ppc64",
"product_id": "glibc-locale-2.11.3-17.109.1.ppc64"
}
},
{
"category": "product_version",
"name": "glibc-locale-32bit-2.11.3-17.109.1.ppc64",
"product": {
"name": "glibc-locale-32bit-2.11.3-17.109.1.ppc64",
"product_id": "glibc-locale-32bit-2.11.3-17.109.1.ppc64"
}
},
{
"category": "product_version",
"name": "glibc-profile-2.11.3-17.109.1.ppc64",
"product": {
"name": "glibc-profile-2.11.3-17.109.1.ppc64",
"product_id": "glibc-profile-2.11.3-17.109.1.ppc64"
}
},
{
"category": "product_version",
"name": "glibc-profile-32bit-2.11.3-17.109.1.ppc64",
"product": {
"name": "glibc-profile-32bit-2.11.3-17.109.1.ppc64",
"product_id": "glibc-profile-32bit-2.11.3-17.109.1.ppc64"
}
},
{
"category": "product_version",
"name": "nscd-2.11.3-17.109.1.ppc64",
"product": {
"name": "nscd-2.11.3-17.109.1.ppc64",
"product_id": "nscd-2.11.3-17.109.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.11.3-17.109.1.s390x",
"product": {
"name": "glibc-2.11.3-17.109.1.s390x",
"product_id": "glibc-2.11.3-17.109.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-32bit-2.11.3-17.109.1.s390x",
"product": {
"name": "glibc-32bit-2.11.3-17.109.1.s390x",
"product_id": "glibc-32bit-2.11.3-17.109.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.11.3-17.109.1.s390x",
"product": {
"name": "glibc-devel-2.11.3-17.109.1.s390x",
"product_id": "glibc-devel-2.11.3-17.109.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-devel-32bit-2.11.3-17.109.1.s390x",
"product": {
"name": "glibc-devel-32bit-2.11.3-17.109.1.s390x",
"product_id": "glibc-devel-32bit-2.11.3-17.109.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-html-2.11.3-17.109.1.s390x",
"product": {
"name": "glibc-html-2.11.3-17.109.1.s390x",
"product_id": "glibc-html-2.11.3-17.109.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-i18ndata-2.11.3-17.109.1.s390x",
"product": {
"name": "glibc-i18ndata-2.11.3-17.109.1.s390x",
"product_id": "glibc-i18ndata-2.11.3-17.109.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-info-2.11.3-17.109.1.s390x",
"product": {
"name": "glibc-info-2.11.3-17.109.1.s390x",
"product_id": "glibc-info-2.11.3-17.109.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.11.3-17.109.1.s390x",
"product": {
"name": "glibc-locale-2.11.3-17.109.1.s390x",
"product_id": "glibc-locale-2.11.3-17.109.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-locale-32bit-2.11.3-17.109.1.s390x",
"product": {
"name": "glibc-locale-32bit-2.11.3-17.109.1.s390x",
"product_id": "glibc-locale-32bit-2.11.3-17.109.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-profile-2.11.3-17.109.1.s390x",
"product": {
"name": "glibc-profile-2.11.3-17.109.1.s390x",
"product_id": "glibc-profile-2.11.3-17.109.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-profile-32bit-2.11.3-17.109.1.s390x",
"product": {
"name": "glibc-profile-32bit-2.11.3-17.109.1.s390x",
"product_id": "glibc-profile-32bit-2.11.3-17.109.1.s390x"
}
},
{
"category": "product_version",
"name": "nscd-2.11.3-17.109.1.s390x",
"product": {
"name": "nscd-2.11.3-17.109.1.s390x",
"product_id": "nscd-2.11.3-17.109.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-html-2.11.3-17.109.1.x86_64",
"product": {
"name": "glibc-html-2.11.3-17.109.1.x86_64",
"product_id": "glibc-html-2.11.3-17.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-info-2.11.3-17.109.1.x86_64",
"product": {
"name": "glibc-info-2.11.3-17.109.1.x86_64",
"product_id": "glibc-info-2.11.3-17.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-2.11.3-17.109.1.x86_64",
"product": {
"name": "glibc-2.11.3-17.109.1.x86_64",
"product_id": "glibc-2.11.3-17.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-32bit-2.11.3-17.109.1.x86_64",
"product": {
"name": "glibc-32bit-2.11.3-17.109.1.x86_64",
"product_id": "glibc-32bit-2.11.3-17.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.11.3-17.109.1.x86_64",
"product": {
"name": "glibc-devel-2.11.3-17.109.1.x86_64",
"product_id": "glibc-devel-2.11.3-17.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-devel-32bit-2.11.3-17.109.1.x86_64",
"product": {
"name": "glibc-devel-32bit-2.11.3-17.109.1.x86_64",
"product_id": "glibc-devel-32bit-2.11.3-17.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-i18ndata-2.11.3-17.109.1.x86_64",
"product": {
"name": "glibc-i18ndata-2.11.3-17.109.1.x86_64",
"product_id": "glibc-i18ndata-2.11.3-17.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.11.3-17.109.1.x86_64",
"product": {
"name": "glibc-locale-2.11.3-17.109.1.x86_64",
"product_id": "glibc-locale-2.11.3-17.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-locale-32bit-2.11.3-17.109.1.x86_64",
"product": {
"name": "glibc-locale-32bit-2.11.3-17.109.1.x86_64",
"product_id": "glibc-locale-32bit-2.11.3-17.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-profile-2.11.3-17.109.1.x86_64",
"product": {
"name": "glibc-profile-2.11.3-17.109.1.x86_64",
"product_id": "glibc-profile-2.11.3-17.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-profile-32bit-2.11.3-17.109.1.x86_64",
"product": {
"name": "glibc-profile-32bit-2.11.3-17.109.1.x86_64",
"product_id": "glibc-profile-32bit-2.11.3-17.109.1.x86_64"
}
},
{
"category": "product_version",
"name": "nscd-2.11.3-17.109.1.x86_64",
"product": {
"name": "nscd-2.11.3-17.109.1.x86_64",
"product_id": "nscd-2.11.3-17.109.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-sdk:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product": {
"name": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-pos:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:11:sp3:teradata"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:glibc-html-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-html-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:glibc-html-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-html-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:glibc-info-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-info-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 11 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:glibc-info-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-info-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:glibc-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.i686 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:glibc-2.11.3-17.109.1.i686"
},
"product_reference": "glibc-2.11.3-17.109.1.i686",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:glibc-devel-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.i686 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:glibc-devel-2.11.3-17.109.1.i686"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.i686",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:glibc-html-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-html-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:glibc-i18ndata-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-i18ndata-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:glibc-info-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-info-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:glibc-locale-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-locale-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:glibc-profile-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-profile-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
"product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:nscd-2.11.3-17.109.1.i586"
},
"product_reference": "nscd-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.i686 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-2.11.3-17.109.1.i686"
},
"product_reference": "glibc-2.11.3-17.109.1.i686",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-32bit-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-32bit-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-32bit-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-32bit-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.i686 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-2.11.3-17.109.1.i686"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.i686",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-32bit-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-devel-32bit-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-32bit-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-devel-32bit-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-html-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-html-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-html-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-html-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-html-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-html-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-i18ndata-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-i18ndata-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-i18ndata-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-i18ndata-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-i18ndata-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-i18ndata-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-info-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-info-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-info-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-info-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-info-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-info-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-locale-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-locale-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-locale-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-32bit-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-locale-32bit-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-32bit-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-locale-32bit-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-profile-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-profile-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-profile-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-32bit-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-profile-32bit-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-32bit-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-profile-32bit-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:nscd-2.11.3-17.109.1.i586"
},
"product_reference": "nscd-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:nscd-2.11.3-17.109.1.s390x"
},
"product_reference": "nscd-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:nscd-2.11.3-17.109.1.x86_64"
},
"product_reference": "nscd-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.i686 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-2.11.3-17.109.1.i686"
},
"product_reference": "glibc-2.11.3-17.109.1.i686",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-32bit-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-32bit-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-32bit-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-32bit-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.i686 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-2.11.3-17.109.1.i686"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.i686",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-32bit-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-devel-32bit-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-32bit-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-devel-32bit-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-html-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-html-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-html-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-html-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-html-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-html-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-i18ndata-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-i18ndata-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-i18ndata-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-i18ndata-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-i18ndata-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-i18ndata-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-info-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-info-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-info-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-info-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-info-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-info-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-locale-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-locale-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-locale-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-32bit-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-locale-32bit-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-32bit-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-locale-32bit-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-profile-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-profile-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-profile-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-32bit-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-profile-32bit-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-32bit-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-profile-32bit-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:nscd-2.11.3-17.109.1.i586"
},
"product_reference": "nscd-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:nscd-2.11.3-17.109.1.s390x"
},
"product_reference": "nscd-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
"product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:nscd-2.11.3-17.109.1.x86_64"
},
"product_reference": "nscd-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.i686 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.i686"
},
"product_reference": "glibc-2.11.3-17.109.1.i686",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-32bit-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-32bit-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-32bit-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-32bit-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-32bit-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-32bit-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.i686 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.i686"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.i686",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-devel-32bit-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-devel-32bit-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-devel-32bit-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-html-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-html-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-html-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-html-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-html-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-i18ndata-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-i18ndata-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-i18ndata-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-i18ndata-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-i18ndata-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-info-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-info-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-info-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-info-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-info-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-locale-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-locale-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-locale-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-locale-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-locale-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-locale-32bit-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-locale-32bit-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-locale-32bit-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-x86-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-locale-x86-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-locale-x86-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-profile-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-profile-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-profile-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-profile-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-profile-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-profile-32bit-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-profile-32bit-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-profile-32bit-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-x86-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-profile-x86-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-profile-x86-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-x86-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:glibc-x86-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-x86-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.i586"
},
"product_reference": "nscd-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.ia64"
},
"product_reference": "nscd-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.ppc64"
},
"product_reference": "nscd-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.s390x"
},
"product_reference": "nscd-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4",
"product_id": "SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.x86_64"
},
"product_reference": "nscd-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.i686 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.i686"
},
"product_reference": "glibc-2.11.3-17.109.1.i686",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-32bit-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-32bit-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-32bit-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-32bit-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-32bit-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-32bit-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.i686 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.i686"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.i686",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-devel-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-devel-32bit-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-devel-32bit-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-devel-32bit-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-html-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-html-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-html-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-html-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-html-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-i18ndata-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-i18ndata-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-i18ndata-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-i18ndata-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-i18ndata-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-info-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-info-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-info-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-info-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-info-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-locale-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-locale-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-locale-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-locale-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-locale-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-locale-32bit-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-locale-32bit-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-locale-32bit-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-x86-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-x86-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-locale-x86-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.i586"
},
"product_reference": "glibc-profile-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-profile-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-profile-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-profile-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-profile-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.ppc64"
},
"product_reference": "glibc-profile-32bit-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.s390x"
},
"product_reference": "glibc-profile-32bit-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.x86_64"
},
"product_reference": "glibc-profile-32bit-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-x86-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-x86-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-profile-x86-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-x86-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-x86-2.11.3-17.109.1.ia64"
},
"product_reference": "glibc-x86-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.11.3-17.109.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.i586"
},
"product_reference": "nscd-2.11.3-17.109.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.11.3-17.109.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.ia64"
},
"product_reference": "nscd-2.11.3-17.109.1.ia64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.11.3-17.109.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.ppc64"
},
"product_reference": "nscd-2.11.3-17.109.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.11.3-17.109.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.s390x"
},
"product_reference": "nscd-2.11.3-17.109.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.11.3-17.109.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.x86_64"
},
"product_reference": "nscd-2.11.3-17.109.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-1000366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000366"
}
],
"notes": [
{
"category": "general",
"text": "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-devel-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-devel-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-html-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-i18ndata-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-info-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-locale-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-profile-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:nscd-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-html-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-html-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-html-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-i18ndata-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-i18ndata-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-i18ndata-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-info-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-info-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-info-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:nscd-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:nscd-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:nscd-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-html-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-html-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-html-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-i18ndata-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-i18ndata-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-i18ndata-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-info-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-info-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-info-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:nscd-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:nscd-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:nscd-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-x86-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-x86-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-x86-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-x86-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-x86-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-x86-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:glibc-html-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:glibc-html-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:glibc-info-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:glibc-info-2.11.3-17.109.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000366",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366"
},
{
"category": "external",
"summary": "SUSE Bug 1037551 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1037551"
},
{
"category": "external",
"summary": "SUSE Bug 1039357 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1039357"
},
{
"category": "external",
"summary": "SUSE Bug 1063847 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1063847"
},
{
"category": "external",
"summary": "SUSE Bug 1071319 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1071319"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1123874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-devel-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-devel-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-html-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-i18ndata-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-info-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-locale-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-profile-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:nscd-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-html-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-html-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-html-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-i18ndata-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-i18ndata-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-i18ndata-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-info-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-info-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-info-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:nscd-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:nscd-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:nscd-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-html-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-html-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-html-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-i18ndata-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-i18ndata-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-i18ndata-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-info-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-info-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-info-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:nscd-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:nscd-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:nscd-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-x86-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-x86-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-x86-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-x86-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-x86-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-x86-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:glibc-html-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:glibc-html-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:glibc-info-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:glibc-info-2.11.3-17.109.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-devel-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-devel-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-html-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-i18ndata-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-info-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-locale-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:glibc-profile-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Point of Sale 11 SP3:nscd-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-devel-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-html-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-html-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-html-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-i18ndata-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-i18ndata-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-i18ndata-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-info-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-info-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-info-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-locale-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:glibc-profile-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-LTSS:nscd-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-LTSS:nscd-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-LTSS:nscd-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-devel-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-html-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-html-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-html-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-i18ndata-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-i18ndata-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-i18ndata-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-info-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-info-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-info-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-locale-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:glibc-profile-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:nscd-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:nscd-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP3-TERADATA:nscd-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-html-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-i18ndata-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-info-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-locale-x86-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4:glibc-profile-x86-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:glibc-x86-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server 11 SP4:nscd-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.i686",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-devel-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-html-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-i18ndata-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-info-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-locale-x86-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-32bit-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-profile-x86-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:glibc-x86-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.ia64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.ppc64",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 11 SP4:nscd-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:glibc-html-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:glibc-html-2.11.3-17.109.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 11 SP4:glibc-info-2.11.3-17.109.1.i586",
"SUSE Linux Enterprise Software Development Kit 11 SP4:glibc-info-2.11.3-17.109.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-06-19T19:21:38Z",
"details": "important"
}
],
"title": "CVE-2017-1000366"
}
]
}
SUSE-SU-2017:1611-1
Vulnerability from csaf_suse - Published: 2017-06-19 15:17 - Updated: 2017-06-19 15:17Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for glibc",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for glibc fixes the following issues:\n\n- CVE-2017-1000366: Fix a potential privilege escalation vulnerability that\n allowed unprivileged system users to manipulate the stack of setuid binaries\n to gain special privileges. [bsc#1039357]\n\n- The incorrectly defined constant O_TMPFILE has been fixed. [bsc#1038690]\n\n- A defect in glibc\u0027s regression test suite has been remedied to avoid false\n positives. [bsc#987216]\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-SAP-12-2017-988,SUSE-SLE-SERVER-12-2017-988",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1611-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:1611-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171611-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:1611-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-June/002956.html"
},
{
"category": "self",
"summary": "SUSE Bug 1038690",
"url": "https://bugzilla.suse.com/1038690"
},
{
"category": "self",
"summary": "SUSE Bug 1039357",
"url": "https://bugzilla.suse.com/1039357"
},
{
"category": "self",
"summary": "SUSE Bug 987216",
"url": "https://bugzilla.suse.com/987216"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000366 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366/"
}
],
"title": "Security update for glibc",
"tracking": {
"current_release_date": "2017-06-19T15:17:45Z",
"generator": {
"date": "2017-06-19T15:17:45Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:1611-1",
"initial_release_date": "2017-06-19T15:17:45Z",
"revision_history": [
{
"date": "2017-06-19T15:17:45Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glibc-html-2.19-22.21.1.noarch",
"product": {
"name": "glibc-html-2.19-22.21.1.noarch",
"product_id": "glibc-html-2.19-22.21.1.noarch"
}
},
{
"category": "product_version",
"name": "glibc-i18ndata-2.19-22.21.1.noarch",
"product": {
"name": "glibc-i18ndata-2.19-22.21.1.noarch",
"product_id": "glibc-i18ndata-2.19-22.21.1.noarch"
}
},
{
"category": "product_version",
"name": "glibc-info-2.19-22.21.1.noarch",
"product": {
"name": "glibc-info-2.19-22.21.1.noarch",
"product_id": "glibc-info-2.19-22.21.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.19-22.21.1.ppc64le",
"product": {
"name": "glibc-2.19-22.21.1.ppc64le",
"product_id": "glibc-2.19-22.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.19-22.21.1.ppc64le",
"product": {
"name": "glibc-devel-2.19-22.21.1.ppc64le",
"product_id": "glibc-devel-2.19-22.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.19-22.21.1.ppc64le",
"product": {
"name": "glibc-locale-2.19-22.21.1.ppc64le",
"product_id": "glibc-locale-2.19-22.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-profile-2.19-22.21.1.ppc64le",
"product": {
"name": "glibc-profile-2.19-22.21.1.ppc64le",
"product_id": "glibc-profile-2.19-22.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nscd-2.19-22.21.1.ppc64le",
"product": {
"name": "nscd-2.19-22.21.1.ppc64le",
"product_id": "nscd-2.19-22.21.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.19-22.21.1.s390x",
"product": {
"name": "glibc-2.19-22.21.1.s390x",
"product_id": "glibc-2.19-22.21.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-32bit-2.19-22.21.1.s390x",
"product": {
"name": "glibc-32bit-2.19-22.21.1.s390x",
"product_id": "glibc-32bit-2.19-22.21.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.19-22.21.1.s390x",
"product": {
"name": "glibc-devel-2.19-22.21.1.s390x",
"product_id": "glibc-devel-2.19-22.21.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-devel-32bit-2.19-22.21.1.s390x",
"product": {
"name": "glibc-devel-32bit-2.19-22.21.1.s390x",
"product_id": "glibc-devel-32bit-2.19-22.21.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.19-22.21.1.s390x",
"product": {
"name": "glibc-locale-2.19-22.21.1.s390x",
"product_id": "glibc-locale-2.19-22.21.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-locale-32bit-2.19-22.21.1.s390x",
"product": {
"name": "glibc-locale-32bit-2.19-22.21.1.s390x",
"product_id": "glibc-locale-32bit-2.19-22.21.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-profile-2.19-22.21.1.s390x",
"product": {
"name": "glibc-profile-2.19-22.21.1.s390x",
"product_id": "glibc-profile-2.19-22.21.1.s390x"
}
},
{
"category": "product_version",
"name": "glibc-profile-32bit-2.19-22.21.1.s390x",
"product": {
"name": "glibc-profile-32bit-2.19-22.21.1.s390x",
"product_id": "glibc-profile-32bit-2.19-22.21.1.s390x"
}
},
{
"category": "product_version",
"name": "nscd-2.19-22.21.1.s390x",
"product": {
"name": "nscd-2.19-22.21.1.s390x",
"product_id": "nscd-2.19-22.21.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.19-22.21.1.x86_64",
"product": {
"name": "glibc-2.19-22.21.1.x86_64",
"product_id": "glibc-2.19-22.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-32bit-2.19-22.21.1.x86_64",
"product": {
"name": "glibc-32bit-2.19-22.21.1.x86_64",
"product_id": "glibc-32bit-2.19-22.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.19-22.21.1.x86_64",
"product": {
"name": "glibc-devel-2.19-22.21.1.x86_64",
"product_id": "glibc-devel-2.19-22.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-devel-32bit-2.19-22.21.1.x86_64",
"product": {
"name": "glibc-devel-32bit-2.19-22.21.1.x86_64",
"product_id": "glibc-devel-32bit-2.19-22.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.19-22.21.1.x86_64",
"product": {
"name": "glibc-locale-2.19-22.21.1.x86_64",
"product_id": "glibc-locale-2.19-22.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-locale-32bit-2.19-22.21.1.x86_64",
"product": {
"name": "glibc-locale-32bit-2.19-22.21.1.x86_64",
"product_id": "glibc-locale-32bit-2.19-22.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-profile-2.19-22.21.1.x86_64",
"product": {
"name": "glibc-profile-2.19-22.21.1.x86_64",
"product_id": "glibc-profile-2.19-22.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-profile-32bit-2.19-22.21.1.x86_64",
"product": {
"name": "glibc-profile-32bit-2.19-22.21.1.x86_64",
"product_id": "glibc-profile-32bit-2.19-22.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "nscd-2.19-22.21.1.x86_64",
"product": {
"name": "nscd-2.19-22.21.1.x86_64",
"product_id": "nscd-2.19-22.21.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.19-22.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:glibc-2.19-22.21.1.x86_64"
},
"product_reference": "glibc-2.19-22.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.19-22.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:glibc-32bit-2.19-22.21.1.x86_64"
},
"product_reference": "glibc-32bit-2.19-22.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.19-22.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:glibc-devel-2.19-22.21.1.x86_64"
},
"product_reference": "glibc-devel-2.19-22.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.19-22.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:glibc-devel-32bit-2.19-22.21.1.x86_64"
},
"product_reference": "glibc-devel-32bit-2.19-22.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.19-22.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:glibc-html-2.19-22.21.1.noarch"
},
"product_reference": "glibc-html-2.19-22.21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.19-22.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:glibc-i18ndata-2.19-22.21.1.noarch"
},
"product_reference": "glibc-i18ndata-2.19-22.21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.19-22.21.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:glibc-info-2.19-22.21.1.noarch"
},
"product_reference": "glibc-info-2.19-22.21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.19-22.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:glibc-locale-2.19-22.21.1.x86_64"
},
"product_reference": "glibc-locale-2.19-22.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.19-22.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:glibc-locale-32bit-2.19-22.21.1.x86_64"
},
"product_reference": "glibc-locale-32bit-2.19-22.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.19-22.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:glibc-profile-2.19-22.21.1.x86_64"
},
"product_reference": "glibc-profile-2.19-22.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.19-22.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:glibc-profile-32bit-2.19-22.21.1.x86_64"
},
"product_reference": "glibc-profile-32bit-2.19-22.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.19-22.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12:nscd-2.19-22.21.1.x86_64"
},
"product_reference": "nscd-2.19-22.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.19-22.21.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-2.19-22.21.1.ppc64le"
},
"product_reference": "glibc-2.19-22.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.19-22.21.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-2.19-22.21.1.s390x"
},
"product_reference": "glibc-2.19-22.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.19-22.21.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-2.19-22.21.1.x86_64"
},
"product_reference": "glibc-2.19-22.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.19-22.21.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-32bit-2.19-22.21.1.s390x"
},
"product_reference": "glibc-32bit-2.19-22.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.19-22.21.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-32bit-2.19-22.21.1.x86_64"
},
"product_reference": "glibc-32bit-2.19-22.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.19-22.21.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-devel-2.19-22.21.1.ppc64le"
},
"product_reference": "glibc-devel-2.19-22.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.19-22.21.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-devel-2.19-22.21.1.s390x"
},
"product_reference": "glibc-devel-2.19-22.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.19-22.21.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-devel-2.19-22.21.1.x86_64"
},
"product_reference": "glibc-devel-2.19-22.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.19-22.21.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-devel-32bit-2.19-22.21.1.s390x"
},
"product_reference": "glibc-devel-32bit-2.19-22.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.19-22.21.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-devel-32bit-2.19-22.21.1.x86_64"
},
"product_reference": "glibc-devel-32bit-2.19-22.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.19-22.21.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-html-2.19-22.21.1.noarch"
},
"product_reference": "glibc-html-2.19-22.21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.19-22.21.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-i18ndata-2.19-22.21.1.noarch"
},
"product_reference": "glibc-i18ndata-2.19-22.21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.19-22.21.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-info-2.19-22.21.1.noarch"
},
"product_reference": "glibc-info-2.19-22.21.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.19-22.21.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-locale-2.19-22.21.1.ppc64le"
},
"product_reference": "glibc-locale-2.19-22.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.19-22.21.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-locale-2.19-22.21.1.s390x"
},
"product_reference": "glibc-locale-2.19-22.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.19-22.21.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-locale-2.19-22.21.1.x86_64"
},
"product_reference": "glibc-locale-2.19-22.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.19-22.21.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-locale-32bit-2.19-22.21.1.s390x"
},
"product_reference": "glibc-locale-32bit-2.19-22.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.19-22.21.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-locale-32bit-2.19-22.21.1.x86_64"
},
"product_reference": "glibc-locale-32bit-2.19-22.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.19-22.21.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-profile-2.19-22.21.1.ppc64le"
},
"product_reference": "glibc-profile-2.19-22.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.19-22.21.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-profile-2.19-22.21.1.s390x"
},
"product_reference": "glibc-profile-2.19-22.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.19-22.21.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-profile-2.19-22.21.1.x86_64"
},
"product_reference": "glibc-profile-2.19-22.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.19-22.21.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-profile-32bit-2.19-22.21.1.s390x"
},
"product_reference": "glibc-profile-32bit-2.19-22.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.19-22.21.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:glibc-profile-32bit-2.19-22.21.1.x86_64"
},
"product_reference": "glibc-profile-32bit-2.19-22.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.19-22.21.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:nscd-2.19-22.21.1.ppc64le"
},
"product_reference": "nscd-2.19-22.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.19-22.21.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:nscd-2.19-22.21.1.s390x"
},
"product_reference": "nscd-2.19-22.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.19-22.21.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS",
"product_id": "SUSE Linux Enterprise Server 12-LTSS:nscd-2.19-22.21.1.x86_64"
},
"product_reference": "nscd-2.19-22.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-1000366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000366"
}
],
"notes": [
{
"category": "general",
"text": "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12-LTSS:glibc-2.19-22.21.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:glibc-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-32bit-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-devel-2.19-22.21.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:glibc-devel-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-devel-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-devel-32bit-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-devel-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-html-2.19-22.21.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:glibc-i18ndata-2.19-22.21.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:glibc-info-2.19-22.21.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:glibc-locale-2.19-22.21.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:glibc-locale-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-locale-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-locale-32bit-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-locale-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-profile-2.19-22.21.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:glibc-profile-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-profile-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-profile-32bit-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-profile-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:nscd-2.19-22.21.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:nscd-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:nscd-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-devel-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-devel-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-html-2.19-22.21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-i18ndata-2.19-22.21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-info-2.19-22.21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-locale-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-locale-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-profile-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-profile-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:nscd-2.19-22.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000366",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366"
},
{
"category": "external",
"summary": "SUSE Bug 1037551 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1037551"
},
{
"category": "external",
"summary": "SUSE Bug 1039357 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1039357"
},
{
"category": "external",
"summary": "SUSE Bug 1063847 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1063847"
},
{
"category": "external",
"summary": "SUSE Bug 1071319 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1071319"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1123874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12-LTSS:glibc-2.19-22.21.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:glibc-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-32bit-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-devel-2.19-22.21.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:glibc-devel-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-devel-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-devel-32bit-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-devel-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-html-2.19-22.21.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:glibc-i18ndata-2.19-22.21.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:glibc-info-2.19-22.21.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:glibc-locale-2.19-22.21.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:glibc-locale-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-locale-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-locale-32bit-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-locale-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-profile-2.19-22.21.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:glibc-profile-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-profile-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-profile-32bit-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-profile-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:nscd-2.19-22.21.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:nscd-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:nscd-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-devel-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-devel-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-html-2.19-22.21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-i18ndata-2.19-22.21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-info-2.19-22.21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-locale-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-locale-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-profile-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-profile-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:nscd-2.19-22.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12-LTSS:glibc-2.19-22.21.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:glibc-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-32bit-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-devel-2.19-22.21.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:glibc-devel-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-devel-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-devel-32bit-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-devel-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-html-2.19-22.21.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:glibc-i18ndata-2.19-22.21.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:glibc-info-2.19-22.21.1.noarch",
"SUSE Linux Enterprise Server 12-LTSS:glibc-locale-2.19-22.21.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:glibc-locale-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-locale-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-locale-32bit-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-locale-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-profile-2.19-22.21.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:glibc-profile-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-profile-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:glibc-profile-32bit-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:glibc-profile-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server 12-LTSS:nscd-2.19-22.21.1.ppc64le",
"SUSE Linux Enterprise Server 12-LTSS:nscd-2.19-22.21.1.s390x",
"SUSE Linux Enterprise Server 12-LTSS:nscd-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-devel-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-devel-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-html-2.19-22.21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-i18ndata-2.19-22.21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-info-2.19-22.21.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-locale-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-locale-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-profile-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:glibc-profile-32bit-2.19-22.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12:nscd-2.19-22.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-06-19T15:17:45Z",
"details": "important"
}
],
"title": "CVE-2017-1000366"
}
]
}
SUSE-SU-2017:2700-1
Vulnerability from csaf_suse - Published: 2017-10-10 19:37 - Updated: 2017-10-10 19:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for SLES 12-SP1 Docker image",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise Server 12 SP1 container image has been updated to include\nsecurity and stability fixes.\n\nThe following issues related to building of the container images have been fixed:\n\n- Included krb5 package to avoid the inclusion of krb5-mini which gets selected as a\n dependency by the Build Service solver. (bsc#1056193)\n- Do not install recommended packages when building container images. (bsc#975726)\n\nA number of security issues that have been already fixed by updates released for\nSUSE Linux Enterprise Server 12 SP1 are now included in the base image. A package/CVE\ncross-reference is available below.\n\npam:\n\n- CVE-2015-3238\n\nlibtasn1:\n\n- CVE-2015-3622\n- CVE-2016-4008\n\nexpat:\n\nexpat:\n\n- CVE-2012-6702\n- CVE-2015-1283\n- CVE-2016-0718\n- CVE-2016-5300\n- CVE-2016-9063\n- CVE-2017-9233\n\nlibidn:\n\n- CVE-2015-2059\n- CVE-2015-8948\n- CVE-2016-6261\n- CVE-2016-6262\n- CVE-2016-6263\n\n\nzlib:\n\n- CVE-2016-9840\n- CVE-2016-9841\n- CVE-2016-9842\n- CVE-2016-9843\n\ncurl:\n\n- CVE-2016-5419\n- CVE-2016-5420\n- CVE-2016-5421\n- CVE-2016-7141\n- CVE-2016-7167\n- CVE-2016-8615\n- CVE-2016-8616\n- CVE-2016-8617\n- CVE-2016-8618\n- CVE-2016-8619\n- CVE-2016-8620\n- CVE-2016-8621\n- CVE-2016-8622\n- CVE-2016-8623\n- CVE-2016-8624\n- CVE-2016-9586\n- CVE-2017-1000100\n- CVE-2017-1000101\n- CVE-2017-7407\n\nopenssl:\n\n- CVE-2016-2105\n- CVE-2016-2106\n- CVE-2016-2107\n- CVE-2016-2108\n- CVE-2016-2109\n- CVE-2016-2177\n- CVE-2016-2178\n- CVE-2016-2179\n- CVE-2016-2180\n- CVE-2016-2181\n- CVE-2016-2182\n- CVE-2016-2183\n- CVE-2016-6302\n- CVE-2016-6303\n- CVE-2016-6304\n- CVE-2016-6306\n- CVE-2016-7056\n- CVE-2016-8610\n- CVE-2017-3731\n\ncracklib:\n\n- CVE-2016-6318\n\npcre:\n\n- CVE-2014-8964\n- CVE-2015-2325\n- CVE-2015-2327\n- CVE-2015-2328\n- CVE-2015-3210\n- CVE-2015-3217\n- CVE-2015-5073\n- CVE-2015-8380\n- CVE-2015-8381\n- CVE-2015-8382\n- CVE-2015-8383\n- CVE-2015-8384\n- CVE-2015-8385\n- CVE-2015-8386\n- CVE-2015-8387\n- CVE-2015-8388\n- CVE-2015-8389\n- CVE-2015-8390\n- CVE-2015-8391\n- CVE-2015-8392\n- CVE-2015-8393\n- CVE-2015-8394\n- CVE-2015-8395\n- CVE-2016-1283\n- CVE-2016-3191\n\nappamor:\n\n- CVE-2017-6507\n\nbash:\n\n- CVE-2014-6277\n- CVE-2014-6278\n- CVE-2016-0634\n- CVE-2016-7543\n\ncpio:\n\n- CVE-2016-2037\n\nglibc:\n\n- CVE-2016-1234\n- CVE-2016-3075\n- CVE-2016-3706\n- CVE-2016-4429\n- CVE-2017-1000366\n\nperl:\n\n- CVE-2015-8853\n- CVE-2016-1238\n- CVE-2016-2381\n- CVE-2016-6185\n\nlibssh2_org:\n\n- CVE-2016-0787\n\nutil-linux:\n\n- CVE-2016-5011\n- CVE-2017-2616\n\nncurses:\n\n- CVE-2017-10684\n- CVE-2017-10685\n- CVE-2017-11112\n- CVE-2017-11113\n\nlibksba:\n\n- CVE-2016-4574\n- CVE-2016-4579\n\nlibxml2:\n\n- CVE-2014-0191\n- CVE-2015-8806\n- CVE-2016-1762\n- CVE-2016-1833\n- CVE-2016-1834\n- CVE-2016-1835\n- CVE-2016-1837\n- CVE-2016-1838\n- CVE-2016-1839\n- CVE-2016-1840\n- CVE-2016-2073\n- CVE-2016-3627\n- CVE-2016-3705\n- CVE-2016-4447\n- CVE-2016-4448\n- CVE-2016-4449\n- CVE-2016-4483\n- CVE-2016-4658\n- CVE-2016-9318\n- CVE-2016-9597\n- CVE-2017-9047\n- CVE-2017-9048\n- CVE-2017-9049\n- CVE-2017-9050\n\nlibgcrypt:\n\n- CVE-2015-7511\n- CVE-2016-6313\n- CVE-2017-7526\n\nupdate-alternatives:\n\n- CVE-2015-0860\n\nsystemd:\n\n- CVE-2014-9770\n- CVE-2015-8842\n- CVE-2016-7796\n\ndbus-1:\n\n- CVE-2014-7824\n- CVE-2015-0245\n\nFinally, the following packages received non-security fixes:\n\n- augeas\n- bzip2\n- ca-certificates-mozilla\n- coreutils\n- cryptsetup\n- cyrus-sasl\n- dirmngr\n- e2fsprogs\n- findutils\n- gpg2\n- insserv-compat\n- kmod\n- libcap\n- libsolv\n- libzypp\n- lua51\n- lvm2\n- netcfg\n- p11-kit\n- permissions\n- procps\n- rpm\n- sed\n- sg3_utils\n- shadow\n- zypper\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Module-Containers-12-2017-1673",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2700-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:2700-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172700-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:2700-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html"
},
{
"category": "self",
"summary": "SUSE Bug 1056193",
"url": "https://bugzilla.suse.com/1056193"
},
{
"category": "self",
"summary": "SUSE Bug 975726",
"url": "https://bugzilla.suse.com/975726"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-6702 page",
"url": "https://www.suse.com/security/cve/CVE-2012-6702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0191 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6271 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6271/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6277 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6277/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6278 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6278/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7169 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7187 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7824 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8964 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9770 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9770/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0245 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0245/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0860 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0860/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1283 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2059 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2325 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2327 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2327/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2328 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3210 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3210/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3217 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3238 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3622 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3622/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5073 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5276 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5276/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-7511 page",
"url": "https://www.suse.com/security/cve/CVE-2015-7511/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8380 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8381 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8382 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8383 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8383/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8384 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8384/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8385 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8386 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8387 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8387/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8388 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8389 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8390 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8390/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8391 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8391/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8392 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8392/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8393 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8393/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8394 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8394/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8395 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8395/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8806 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8842 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8842/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8853 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8853/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8948 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8948/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0634 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0634/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0718 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0718/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0787 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0787/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1234 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1238 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1283 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1762 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1762/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1833 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1833/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1834 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1834/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1835 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1835/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1837 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1837/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1838 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1838/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1839 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1839/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1840 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1840/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2037 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2073 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2105 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2106 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2107 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2108 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2108/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2109 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2177 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2178 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2179 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2180 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2181 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2181/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2182 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2183 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2381 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3075 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3191 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3627 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3627/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3705 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3705/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3706 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3706/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4008 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4429 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4429/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4447 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4447/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4448 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4449 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4483 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4574 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4574/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4579 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4579/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4658 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4658/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5011 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5011/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5300 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5300/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5419 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5419/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5420 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5420/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5421 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5421/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6185 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6261 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6262 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6262/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6263 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6263/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6302 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6302/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6303 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6304 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6306 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6306/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6313 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6313/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6318 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7056 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7141 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7167 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7543 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7796 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7796/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8610 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8610/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8615 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8616 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8617 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8618 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8619 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8620 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8621 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8622 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8622/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8623 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8624 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9063 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9063/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9318 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9586 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9597 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9840 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9840/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9841 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9841/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9842 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9842/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9843 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9843/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000100 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000100/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000101 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000366 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10684 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10684/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10685 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10685/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11112 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11113 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11113/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2616 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3731 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6507 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6507/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7407 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7407/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7526 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7526/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9047 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9048 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9049 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9049/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9050 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9050/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9233 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9233/"
}
],
"title": "Security update for SLES 12-SP1 Docker image",
"tracking": {
"current_release_date": "2017-10-10T19:37:36Z",
"generator": {
"date": "2017-10-10T19:37:36Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:2700-1",
"initial_release_date": "2017-10-10T19:37:36Z",
"revision_history": [
{
"date": "2017-10-10T19:37:36Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"product": {
"name": "sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"product_id": "sles12sp1-docker-image-1.0.7-20171002.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "sles12sp1-docker-image-1.0.7-20171002.s390x",
"product": {
"name": "sles12sp1-docker-image-1.0.7-20171002.s390x",
"product_id": "sles12sp1-docker-image-1.0.7-20171002.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "sles12sp1-docker-image-1.0.7-20171002.x86_64",
"product": {
"name": "sles12sp1-docker-image-1.0.7-20171002.x86_64",
"product_id": "sles12sp1-docker-image-1.0.7-20171002.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Containers 12",
"product": {
"name": "SUSE Linux Enterprise Module for Containers 12",
"product_id": "SUSE Linux Enterprise Module for Containers 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-containers:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "sles12sp1-docker-image-1.0.7-20171002.ppc64le as component of SUSE Linux Enterprise Module for Containers 12",
"product_id": "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le"
},
"product_reference": "sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sles12sp1-docker-image-1.0.7-20171002.s390x as component of SUSE Linux Enterprise Module for Containers 12",
"product_id": "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x"
},
"product_reference": "sles12sp1-docker-image-1.0.7-20171002.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sles12sp1-docker-image-1.0.7-20171002.x86_64 as component of SUSE Linux Enterprise Module for Containers 12",
"product_id": "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
},
"product_reference": "sles12sp1-docker-image-1.0.7-20171002.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-6702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-6702"
}
],
"notes": [
{
"category": "general",
"text": "Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-6702",
"url": "https://www.suse.com/security/cve/CVE-2012-6702"
},
{
"category": "external",
"summary": "SUSE Bug 983215 for CVE-2012-6702",
"url": "https://bugzilla.suse.com/983215"
},
{
"category": "external",
"summary": "SUSE Bug 983216 for CVE-2012-6702",
"url": "https://bugzilla.suse.com/983216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2012-6702"
},
{
"cve": "CVE-2014-0191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-0191"
}
],
"notes": [
{
"category": "general",
"text": "The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-0191",
"url": "https://www.suse.com/security/cve/CVE-2014-0191"
},
{
"category": "external",
"summary": "SUSE Bug 1014873 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/1014873"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 876652 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/876652"
},
{
"category": "external",
"summary": "SUSE Bug 877506 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/877506"
},
{
"category": "external",
"summary": "SUSE Bug 996079 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/996079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2014-0191"
},
{
"cve": "CVE-2014-6271",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6271"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6271",
"url": "https://www.suse.com/security/cve/CVE-2014-6271"
},
{
"category": "external",
"summary": "SUSE Bug 1024628 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/1024628"
},
{
"category": "external",
"summary": "SUSE Bug 1130324 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/1130324"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 896776 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/896776"
},
{
"category": "external",
"summary": "SUSE Bug 898346 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898346"
},
{
"category": "external",
"summary": "SUSE Bug 898604 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898604"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/900127"
},
{
"category": "external",
"summary": "SUSE Bug 900454 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/900454"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2014-6271"
},
{
"cve": "CVE-2014-6277",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6277"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6277",
"url": "https://www.suse.com/security/cve/CVE-2014-6277"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/900127"
},
{
"category": "external",
"summary": "SUSE Bug 900454 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/900454"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2014-6277"
},
{
"cve": "CVE-2014-6278",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6278"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6278",
"url": "https://www.suse.com/security/cve/CVE-2014-6278"
},
{
"category": "external",
"summary": "SUSE Bug 898604 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/898604"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/900127"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2014-6278"
},
{
"cve": "CVE-2014-7169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7169"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7169",
"url": "https://www.suse.com/security/cve/CVE-2014-7169"
},
{
"category": "external",
"summary": "SUSE Bug 1024628 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/1024628"
},
{
"category": "external",
"summary": "SUSE Bug 1130324 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/1130324"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 896776 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/896776"
},
{
"category": "external",
"summary": "SUSE Bug 898346 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898346"
},
{
"category": "external",
"summary": "SUSE Bug 898762 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898762"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 899039 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/899039"
},
{
"category": "external",
"summary": "SUSE Bug 899266 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/899266"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/900127"
},
{
"category": "external",
"summary": "SUSE Bug 900454 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/900454"
},
{
"category": "external",
"summary": "SUSE Bug 902237 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/902237"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2014-7169"
},
{
"cve": "CVE-2014-7187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7187"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7187",
"url": "https://www.suse.com/security/cve/CVE-2014-7187"
},
{
"category": "external",
"summary": "SUSE Bug 1024628 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/1024628"
},
{
"category": "external",
"summary": "SUSE Bug 898603 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898603"
},
{
"category": "external",
"summary": "SUSE Bug 898762 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898762"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 899039 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/899039"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2014-7187"
},
{
"cve": "CVE-2014-7824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7824"
}
],
"notes": [
{
"category": "general",
"text": "D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7824",
"url": "https://www.suse.com/security/cve/CVE-2014-7824"
},
{
"category": "external",
"summary": "SUSE Bug 904017 for CVE-2014-7824",
"url": "https://bugzilla.suse.com/904017"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2014-7824"
},
{
"cve": "CVE-2014-8964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8964"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8964",
"url": "https://www.suse.com/security/cve/CVE-2014-8964"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 924960 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/924960"
},
{
"category": "external",
"summary": "SUSE Bug 933288 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/933288"
},
{
"category": "external",
"summary": "SUSE Bug 936408 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/936408"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2014-8964"
},
{
"cve": "CVE-2014-9770",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9770"
}
],
"notes": [
{
"category": "general",
"text": "tmpfiles.d/systemd.conf in systemd before 214 uses weak permissions for journal files under (1) /run/log/journal/%m and (2) /var/log/journal/%m, which allows local users to obtain sensitive information by reading these files.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9770",
"url": "https://www.suse.com/security/cve/CVE-2014-9770"
},
{
"category": "external",
"summary": "SUSE Bug 972612 for CVE-2014-9770",
"url": "https://bugzilla.suse.com/972612"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2014-9770"
},
{
"cve": "CVE-2015-0245",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0245"
}
],
"notes": [
{
"category": "general",
"text": "D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0245",
"url": "https://www.suse.com/security/cve/CVE-2015-0245"
},
{
"category": "external",
"summary": "SUSE Bug 1003898 for CVE-2015-0245",
"url": "https://bugzilla.suse.com/1003898"
},
{
"category": "external",
"summary": "SUSE Bug 916343 for CVE-2015-0245",
"url": "https://bugzilla.suse.com/916343"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2015-0245"
},
{
"cve": "CVE-2015-0860",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0860"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an \"old-style\" Debian binary package, which triggers a stack-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0860",
"url": "https://www.suse.com/security/cve/CVE-2015-0860"
},
{
"category": "external",
"summary": "SUSE Bug 957160 for CVE-2015-0860",
"url": "https://bugzilla.suse.com/957160"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-0860"
},
{
"cve": "CVE-2015-1283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1283"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1283",
"url": "https://www.suse.com/security/cve/CVE-2015-1283"
},
{
"category": "external",
"summary": "SUSE Bug 1034050 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/1034050"
},
{
"category": "external",
"summary": "SUSE Bug 939077 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/939077"
},
{
"category": "external",
"summary": "SUSE Bug 979441 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/979441"
},
{
"category": "external",
"summary": "SUSE Bug 980391 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/980391"
},
{
"category": "external",
"summary": "SUSE Bug 983985 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/983985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-1283"
},
{
"cve": "CVE-2015-2059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2059"
}
],
"notes": [
{
"category": "general",
"text": "The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2059",
"url": "https://www.suse.com/security/cve/CVE-2015-2059"
},
{
"category": "external",
"summary": "SUSE Bug 1173590 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/1173590"
},
{
"category": "external",
"summary": "SUSE Bug 919214 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/919214"
},
{
"category": "external",
"summary": "SUSE Bug 923241 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/923241"
},
{
"category": "external",
"summary": "SUSE Bug 937096 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/937096"
},
{
"category": "external",
"summary": "SUSE Bug 937097 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/937097"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2015-2059"
},
{
"cve": "CVE-2015-2325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2325"
}
],
"notes": [
{
"category": "general",
"text": "The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2325",
"url": "https://www.suse.com/security/cve/CVE-2015-2325"
},
{
"category": "external",
"summary": "SUSE Bug 924960 for CVE-2015-2325",
"url": "https://bugzilla.suse.com/924960"
},
{
"category": "external",
"summary": "SUSE Bug 933288 for CVE-2015-2325",
"url": "https://bugzilla.suse.com/933288"
},
{
"category": "external",
"summary": "SUSE Bug 936408 for CVE-2015-2325",
"url": "https://bugzilla.suse.com/936408"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-2325",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-2325"
},
{
"cve": "CVE-2015-2327",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2327"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.36 mishandles the /(((a\\2)|(a*)\\g\u003c-1\u003e))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2327",
"url": "https://www.suse.com/security/cve/CVE-2015-2327"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-2327",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957567 for CVE-2015-2327",
"url": "https://bugzilla.suse.com/957567"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-2327"
},
{
"cve": "CVE-2015-2328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2328"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2328",
"url": "https://www.suse.com/security/cve/CVE-2015-2328"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-2328",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957600 for CVE-2015-2328",
"url": "https://bugzilla.suse.com/957600"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-2328"
},
{
"cve": "CVE-2015-3210",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3210"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P\u003cB\u003ec)(?P\u003cB\u003ea(?P=B)))\u003eWGXCREDITS)/, a different vulnerability than CVE-2015-8384.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3210",
"url": "https://www.suse.com/security/cve/CVE-2015-3210"
},
{
"category": "external",
"summary": "SUSE Bug 933288 for CVE-2015-3210",
"url": "https://bugzilla.suse.com/933288"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-3210",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-3210",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2015-3210"
},
{
"cve": "CVE-2015-3217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3217"
}
],
"notes": [
{
"category": "general",
"text": "PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\\\.|([^\\\\\\\\W_])?)+)+$/.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3217",
"url": "https://www.suse.com/security/cve/CVE-2015-3217"
},
{
"category": "external",
"summary": "SUSE Bug 933878 for CVE-2015-3217",
"url": "https://bugzilla.suse.com/933878"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-3217",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2015-3217"
},
{
"cve": "CVE-2015-3238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3238"
}
],
"notes": [
{
"category": "general",
"text": "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3238",
"url": "https://www.suse.com/security/cve/CVE-2015-3238"
},
{
"category": "external",
"summary": "SUSE Bug 1123794 for CVE-2015-3238",
"url": "https://bugzilla.suse.com/1123794"
},
{
"category": "external",
"summary": "SUSE Bug 934920 for CVE-2015-3238",
"url": "https://bugzilla.suse.com/934920"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-3238"
},
{
"cve": "CVE-2015-3622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3622"
}
],
"notes": [
{
"category": "general",
"text": "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3622",
"url": "https://www.suse.com/security/cve/CVE-2015-3622"
},
{
"category": "external",
"summary": "SUSE Bug 929414 for CVE-2015-3622",
"url": "https://bugzilla.suse.com/929414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2015-3622"
},
{
"cve": "CVE-2015-5073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5073"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5073",
"url": "https://www.suse.com/security/cve/CVE-2015-5073"
},
{
"category": "external",
"summary": "SUSE Bug 936227 for CVE-2015-5073",
"url": "https://bugzilla.suse.com/936227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-5073"
},
{
"cve": "CVE-2015-5276",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5276"
}
],
"notes": [
{
"category": "general",
"text": "The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5276",
"url": "https://www.suse.com/security/cve/CVE-2015-5276"
},
{
"category": "external",
"summary": "SUSE Bug 945842 for CVE-2015-5276",
"url": "https://bugzilla.suse.com/945842"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-5276"
},
{
"cve": "CVE-2015-7511",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-7511"
}
],
"notes": [
{
"category": "general",
"text": "Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-7511",
"url": "https://www.suse.com/security/cve/CVE-2015-7511"
},
{
"category": "external",
"summary": "SUSE Bug 965902 for CVE-2015-7511",
"url": "https://bugzilla.suse.com/965902"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-7511"
},
{
"cve": "CVE-2015-8380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8380"
}
],
"notes": [
{
"category": "general",
"text": "The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \\01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8380",
"url": "https://www.suse.com/security/cve/CVE-2015-8380"
},
{
"category": "external",
"summary": "SUSE Bug 957566 for CVE-2015-8380",
"url": "https://bugzilla.suse.com/957566"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2015-8380"
},
{
"cve": "CVE-2015-8381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8381"
}
],
"notes": [
{
"category": "general",
"text": "The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?\u0027R\u0027)(\\k\u0027R\u0027)|((?\u0027R\u0027)))H\u0027Rk\u0027Rf)|s(?\u0027R\u0027))))/ and /(?J:(?|(:(?|(?\u0027R\u0027)(\\z(?|(?\u0027R\u0027)(\\k\u0027R\u0027)|((?\u0027R\u0027)))k\u0027R\u0027)|((?\u0027R\u0027)))H\u0027Ak\u0027Rf)|s(?\u0027R\u0027)))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8381",
"url": "https://www.suse.com/security/cve/CVE-2015-8381"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-8381",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8381",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8381",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-8381"
},
{
"cve": "CVE-2015-8382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8382"
}
],
"notes": [
{
"category": "general",
"text": "The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8382",
"url": "https://www.suse.com/security/cve/CVE-2015-8382"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8382",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8382",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8382"
},
{
"cve": "CVE-2015-8383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8383"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8383",
"url": "https://www.suse.com/security/cve/CVE-2015-8383"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8383",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8383",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8383"
},
{
"cve": "CVE-2015-8384",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8384"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the /(?J)(?\u0027d\u0027(?\u0027d\u0027\\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8384",
"url": "https://www.suse.com/security/cve/CVE-2015-8384"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-8384",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8384",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8384",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8384"
},
{
"cve": "CVE-2015-8385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8385"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the /(?|(\\k\u0027Pm\u0027)|(?\u0027Pm\u0027))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8385",
"url": "https://www.suse.com/security/cve/CVE-2015-8385"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8385",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8385",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8385"
},
{
"cve": "CVE-2015-8386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8386"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8386",
"url": "https://www.suse.com/security/cve/CVE-2015-8386"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8386",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8386",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8386"
},
{
"cve": "CVE-2015-8387",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8387"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8387",
"url": "https://www.suse.com/security/cve/CVE-2015-8387"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8387",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8387",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8387"
},
{
"cve": "CVE-2015-8388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8388"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the /(?=di(?\u003c=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8388",
"url": "https://www.suse.com/security/cve/CVE-2015-8388"
},
{
"category": "external",
"summary": "SUSE Bug 936227 for CVE-2015-8388",
"url": "https://bugzilla.suse.com/936227"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8388",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8388",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8388"
},
{
"cve": "CVE-2015-8389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8389"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8389",
"url": "https://www.suse.com/security/cve/CVE-2015-8389"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8389",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8389",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8389"
},
{
"cve": "CVE-2015-8390",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8390"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the [: and \\\\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8390",
"url": "https://www.suse.com/security/cve/CVE-2015-8390"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8390",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8390",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8390"
},
{
"cve": "CVE-2015-8391",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8391"
}
],
"notes": [
{
"category": "general",
"text": "The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8391",
"url": "https://www.suse.com/security/cve/CVE-2015-8391"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8391",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8391",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8391"
},
{
"cve": "CVE-2015-8392",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8392"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles certain instances of the (?| substring, which allows remote attackers to cause a denial of service (unintended recursion and buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8395.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8392",
"url": "https://www.suse.com/security/cve/CVE-2015-8392"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-8392",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8392",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8392",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-8392"
},
{
"cve": "CVE-2015-8393",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8393"
}
],
"notes": [
{
"category": "general",
"text": "pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8393",
"url": "https://www.suse.com/security/cve/CVE-2015-8393"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8393",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8393",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8393"
},
{
"cve": "CVE-2015-8394",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8394"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the (?(\u003cdigits\u003e) and (?(R\u003cdigits\u003e) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8394",
"url": "https://www.suse.com/security/cve/CVE-2015-8394"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8394",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8394",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8394"
},
{
"cve": "CVE-2015-8395",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8395"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles certain references, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8392.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8395",
"url": "https://www.suse.com/security/cve/CVE-2015-8395"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-8395",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8395",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8395",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8395"
},
{
"cve": "CVE-2015-8806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8806"
}
],
"notes": [
{
"category": "general",
"text": "dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the \"\u003c!DOCTYPE html\" substring in a crafted HTML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8806",
"url": "https://www.suse.com/security/cve/CVE-2015-8806"
},
{
"category": "external",
"summary": "SUSE Bug 963963 for CVE-2015-8806",
"url": "https://bugzilla.suse.com/963963"
},
{
"category": "external",
"summary": "SUSE Bug 965283 for CVE-2015-8806",
"url": "https://bugzilla.suse.com/965283"
},
{
"category": "external",
"summary": "SUSE Bug 981114 for CVE-2015-8806",
"url": "https://bugzilla.suse.com/981114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-8806"
},
{
"cve": "CVE-2015-8842",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8842"
}
],
"notes": [
{
"category": "general",
"text": "tmpfiles.d/systemd.conf in systemd before 229 uses weak permissions for /var/log/journal/%m/system.journal, which allows local users to obtain sensitive information by reading the file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8842",
"url": "https://www.suse.com/security/cve/CVE-2015-8842"
},
{
"category": "external",
"summary": "SUSE Bug 972612 for CVE-2015-8842",
"url": "https://bugzilla.suse.com/972612"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-8842"
},
{
"cve": "CVE-2015-8853",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8853"
}
],
"notes": [
{
"category": "general",
"text": "The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by \"a\\x80.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8853",
"url": "https://www.suse.com/security/cve/CVE-2015-8853"
},
{
"category": "external",
"summary": "SUSE Bug 976584 for CVE-2015-8853",
"url": "https://bugzilla.suse.com/976584"
},
{
"category": "external",
"summary": "SUSE Bug 997948 for CVE-2015-8853",
"url": "https://bugzilla.suse.com/997948"
},
{
"category": "external",
"summary": "SUSE Bug 997950 for CVE-2015-8853",
"url": "https://bugzilla.suse.com/997950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-8853"
},
{
"cve": "CVE-2015-8948",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8948"
}
],
"notes": [
{
"category": "general",
"text": "idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8948",
"url": "https://www.suse.com/security/cve/CVE-2015-8948"
},
{
"category": "external",
"summary": "SUSE Bug 1014473 for CVE-2015-8948",
"url": "https://bugzilla.suse.com/1014473"
},
{
"category": "external",
"summary": "SUSE Bug 1173590 for CVE-2015-8948",
"url": "https://bugzilla.suse.com/1173590"
},
{
"category": "external",
"summary": "SUSE Bug 1190777 for CVE-2015-8948",
"url": "https://bugzilla.suse.com/1190777"
},
{
"category": "external",
"summary": "SUSE Bug 990189 for CVE-2015-8948",
"url": "https://bugzilla.suse.com/990189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-8948"
},
{
"cve": "CVE-2016-0634",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0634"
}
],
"notes": [
{
"category": "general",
"text": "The expansion of \u0027\\h\u0027 in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in \u0027hostname\u0027 of a machine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0634",
"url": "https://www.suse.com/security/cve/CVE-2016-0634"
},
{
"category": "external",
"summary": "SUSE Bug 1000396 for CVE-2016-0634",
"url": "https://bugzilla.suse.com/1000396"
},
{
"category": "external",
"summary": "SUSE Bug 1001299 for CVE-2016-0634",
"url": "https://bugzilla.suse.com/1001299"
},
{
"category": "external",
"summary": "SUSE Bug 1159416 for CVE-2016-0634",
"url": "https://bugzilla.suse.com/1159416"
},
{
"category": "external",
"summary": "SUSE Bug 1188388 for CVE-2016-0634",
"url": "https://bugzilla.suse.com/1188388"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-0634"
},
{
"cve": "CVE-2016-0718",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0718"
}
],
"notes": [
{
"category": "general",
"text": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0718",
"url": "https://www.suse.com/security/cve/CVE-2016-0718"
},
{
"category": "external",
"summary": "SUSE Bug 979441 for CVE-2016-0718",
"url": "https://bugzilla.suse.com/979441"
},
{
"category": "external",
"summary": "SUSE Bug 991809 for CVE-2016-0718",
"url": "https://bugzilla.suse.com/991809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-0718"
},
{
"cve": "CVE-2016-0787",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0787"
}
],
"notes": [
{
"category": "general",
"text": "The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a \"bits/bytes confusion bug.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0787",
"url": "https://www.suse.com/security/cve/CVE-2016-0787"
},
{
"category": "external",
"summary": "SUSE Bug 1149968 for CVE-2016-0787",
"url": "https://bugzilla.suse.com/1149968"
},
{
"category": "external",
"summary": "SUSE Bug 967026 for CVE-2016-0787",
"url": "https://bugzilla.suse.com/967026"
},
{
"category": "external",
"summary": "SUSE Bug 968174 for CVE-2016-0787",
"url": "https://bugzilla.suse.com/968174"
},
{
"category": "external",
"summary": "SUSE Bug 974691 for CVE-2016-0787",
"url": "https://bugzilla.suse.com/974691"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-0787"
},
{
"cve": "CVE-2016-1234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1234"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1234",
"url": "https://www.suse.com/security/cve/CVE-2016-1234"
},
{
"category": "external",
"summary": "SUSE Bug 1020940 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/1020940"
},
{
"category": "external",
"summary": "SUSE Bug 969727 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/969727"
},
{
"category": "external",
"summary": "SUSE Bug 988770 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/988770"
},
{
"category": "external",
"summary": "SUSE Bug 988782 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/988782"
},
{
"category": "external",
"summary": "SUSE Bug 989127 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/989127"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1234"
},
{
"cve": "CVE-2016-1238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1238"
}
],
"notes": [
{
"category": "general",
"text": "(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1238",
"url": "https://www.suse.com/security/cve/CVE-2016-1238"
},
{
"category": "external",
"summary": "SUSE Bug 1108749 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/1108749"
},
{
"category": "external",
"summary": "SUSE Bug 1123389 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/1123389"
},
{
"category": "external",
"summary": "SUSE Bug 987887 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/987887"
},
{
"category": "external",
"summary": "SUSE Bug 988311 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/988311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1238"
},
{
"cve": "CVE-2016-1283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1283"
}
],
"notes": [
{
"category": "general",
"text": "The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\\\"){99}-))(?J)(?\u0027R\u0027(?\u0027R\u0027\u003c((?\u0027RR\u0027(?\u0027R\u0027\\){97)?J)?J)(?\u0027R\u0027(?\u0027R\u0027\\){99|(:(?|(?\u0027R\u0027)(\\k\u0027R\u0027)|((?\u0027R\u0027)))H\u0027R\u0027R)(H\u0027R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1283",
"url": "https://www.suse.com/security/cve/CVE-2016-1283"
},
{
"category": "external",
"summary": "SUSE Bug 960837 for CVE-2016-1283",
"url": "https://bugzilla.suse.com/960837"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2016-1283"
},
{
"cve": "CVE-2016-1762",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1762"
}
],
"notes": [
{
"category": "general",
"text": "The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1762",
"url": "https://www.suse.com/security/cve/CVE-2016-1762"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1762",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981040 for CVE-2016-1762",
"url": "https://bugzilla.suse.com/981040"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1762"
},
{
"cve": "CVE-2016-1833",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1833"
}
],
"notes": [
{
"category": "general",
"text": "The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1833",
"url": "https://www.suse.com/security/cve/CVE-2016-1833"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1833",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981108 for CVE-2016-1833",
"url": "https://bugzilla.suse.com/981108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1833"
},
{
"cve": "CVE-2016-1834",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1834"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1834",
"url": "https://www.suse.com/security/cve/CVE-2016-1834"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1834",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981041 for CVE-2016-1834",
"url": "https://bugzilla.suse.com/981041"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1834"
},
{
"cve": "CVE-2016-1835",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1835"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1835",
"url": "https://www.suse.com/security/cve/CVE-2016-1835"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1835",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981109 for CVE-2016-1835",
"url": "https://bugzilla.suse.com/981109"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1835"
},
{
"cve": "CVE-2016-1837",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1837"
}
],
"notes": [
{
"category": "general",
"text": "Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1837",
"url": "https://www.suse.com/security/cve/CVE-2016-1837"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1837",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981111 for CVE-2016-1837",
"url": "https://bugzilla.suse.com/981111"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1837"
},
{
"cve": "CVE-2016-1838",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1838"
}
],
"notes": [
{
"category": "general",
"text": "The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1838",
"url": "https://www.suse.com/security/cve/CVE-2016-1838"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1838",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981112 for CVE-2016-1838",
"url": "https://bugzilla.suse.com/981112"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1838"
},
{
"cve": "CVE-2016-1839",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1839"
}
],
"notes": [
{
"category": "general",
"text": "The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1839",
"url": "https://www.suse.com/security/cve/CVE-2016-1839"
},
{
"category": "external",
"summary": "SUSE Bug 1039069 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1039069"
},
{
"category": "external",
"summary": "SUSE Bug 1039661 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1039661"
},
{
"category": "external",
"summary": "SUSE Bug 1069433 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1069433"
},
{
"category": "external",
"summary": "SUSE Bug 1069690 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1069690"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 963963 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/963963"
},
{
"category": "external",
"summary": "SUSE Bug 981114 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/981114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1839"
},
{
"cve": "CVE-2016-1840",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1840"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1840",
"url": "https://www.suse.com/security/cve/CVE-2016-1840"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1840",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981115 for CVE-2016-1840",
"url": "https://bugzilla.suse.com/981115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1840"
},
{
"cve": "CVE-2016-2037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2037"
}
],
"notes": [
{
"category": "general",
"text": "The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2037",
"url": "https://www.suse.com/security/cve/CVE-2016-2037"
},
{
"category": "external",
"summary": "SUSE Bug 1028410 for CVE-2016-2037",
"url": "https://bugzilla.suse.com/1028410"
},
{
"category": "external",
"summary": "SUSE Bug 963448 for CVE-2016-2037",
"url": "https://bugzilla.suse.com/963448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-2037"
},
{
"cve": "CVE-2016-2073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2073"
}
],
"notes": [
{
"category": "general",
"text": "The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2073",
"url": "https://www.suse.com/security/cve/CVE-2016-2073"
},
{
"category": "external",
"summary": "SUSE Bug 963963 for CVE-2016-2073",
"url": "https://bugzilla.suse.com/963963"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-2073"
},
{
"cve": "CVE-2016-2105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2105"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2105",
"url": "https://www.suse.com/security/cve/CVE-2016-2105"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 977614 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/977614"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 989902 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/989902"
},
{
"category": "external",
"summary": "SUSE Bug 990369 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/990369"
},
{
"category": "external",
"summary": "SUSE Bug 990370 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/990370"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-2105"
},
{
"cve": "CVE-2016-2106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2106"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2106",
"url": "https://www.suse.com/security/cve/CVE-2016-2106"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 977615 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/977615"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 979279 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/979279"
},
{
"category": "external",
"summary": "SUSE Bug 990369 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/990369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-2106"
},
{
"cve": "CVE-2016-2107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2107"
}
],
"notes": [
{
"category": "general",
"text": "The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2107",
"url": "https://www.suse.com/security/cve/CVE-2016-2107"
},
{
"category": "external",
"summary": "SUSE Bug 976942 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/976942"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 977616 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/977616"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 990369 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/990369"
},
{
"category": "external",
"summary": "SUSE Bug 990370 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/990370"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2016-2107"
},
{
"cve": "CVE-2016-2108",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2108"
}
],
"notes": [
{
"category": "general",
"text": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2108",
"url": "https://www.suse.com/security/cve/CVE-2016-2108"
},
{
"category": "external",
"summary": "SUSE Bug 1001502 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/1001502"
},
{
"category": "external",
"summary": "SUSE Bug 1004499 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/1004499"
},
{
"category": "external",
"summary": "SUSE Bug 1005878 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/1005878"
},
{
"category": "external",
"summary": "SUSE Bug 1148697 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/1148697"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 977617 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/977617"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 989345 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/989345"
},
{
"category": "external",
"summary": "SUSE Bug 996067 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/996067"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2016-2108"
},
{
"cve": "CVE-2016-2109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2109"
}
],
"notes": [
{
"category": "general",
"text": "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2109",
"url": "https://www.suse.com/security/cve/CVE-2016-2109"
},
{
"category": "external",
"summary": "SUSE Bug 1015243 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/1015243"
},
{
"category": "external",
"summary": "SUSE Bug 976942 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/976942"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 990369 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/990369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-2109"
},
{
"cve": "CVE-2016-2177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2177"
}
],
"notes": [
{
"category": "general",
"text": "OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2177",
"url": "https://www.suse.com/security/cve/CVE-2016-2177"
},
{
"category": "external",
"summary": "SUSE Bug 982575 for CVE-2016-2177",
"url": "https://bugzilla.suse.com/982575"
},
{
"category": "external",
"summary": "SUSE Bug 999075 for CVE-2016-2177",
"url": "https://bugzilla.suse.com/999075"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2177",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2016-2177"
},
{
"cve": "CVE-2016-2178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2178"
}
],
"notes": [
{
"category": "general",
"text": "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2178",
"url": "https://www.suse.com/security/cve/CVE-2016-2178"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 983249 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/983249"
},
{
"category": "external",
"summary": "SUSE Bug 983519 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/983519"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-2178"
},
{
"cve": "CVE-2016-2179",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2179"
}
],
"notes": [
{
"category": "general",
"text": "The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2179",
"url": "https://www.suse.com/security/cve/CVE-2016-2179"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-2179",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-2179",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2179",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-2179"
},
{
"cve": "CVE-2016-2180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2180"
}
],
"notes": [
{
"category": "general",
"text": "The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the \"openssl ts\" command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2180",
"url": "https://www.suse.com/security/cve/CVE-2016-2180"
},
{
"category": "external",
"summary": "SUSE Bug 1003811 for CVE-2016-2180",
"url": "https://bugzilla.suse.com/1003811"
},
{
"category": "external",
"summary": "SUSE Bug 990419 for CVE-2016-2180",
"url": "https://bugzilla.suse.com/990419"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2180",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-2180"
},
{
"cve": "CVE-2016-2181",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2181"
}
],
"notes": [
{
"category": "general",
"text": "The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2181",
"url": "https://www.suse.com/security/cve/CVE-2016-2181"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-2181",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 994749 for CVE-2016-2181",
"url": "https://bugzilla.suse.com/994749"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-2181",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2181",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-2181"
},
{
"cve": "CVE-2016-2182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2182"
}
],
"notes": [
{
"category": "general",
"text": "The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2182",
"url": "https://www.suse.com/security/cve/CVE-2016-2182"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 993819 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/993819"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 995959 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/995959"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-2182"
},
{
"cve": "CVE-2016-2183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2183"
}
],
"notes": [
{
"category": "general",
"text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2183",
"url": "https://www.suse.com/security/cve/CVE-2016-2183"
},
{
"category": "external",
"summary": "SUSE Bug 1001912 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1001912"
},
{
"category": "external",
"summary": "SUSE Bug 1024218 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1024218"
},
{
"category": "external",
"summary": "SUSE Bug 1027038 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1027038"
},
{
"category": "external",
"summary": "SUSE Bug 1034689 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1034689"
},
{
"category": "external",
"summary": "SUSE Bug 1056614 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1056614"
},
{
"category": "external",
"summary": "SUSE Bug 1171693 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1171693"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 995359 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/995359"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-2183"
},
{
"cve": "CVE-2016-2381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2381"
}
],
"notes": [
{
"category": "general",
"text": "Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2381",
"url": "https://www.suse.com/security/cve/CVE-2016-2381"
},
{
"category": "external",
"summary": "SUSE Bug 967082 for CVE-2016-2381",
"url": "https://bugzilla.suse.com/967082"
},
{
"category": "external",
"summary": "SUSE Bug 992991 for CVE-2016-2381",
"url": "https://bugzilla.suse.com/992991"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-2381"
},
{
"cve": "CVE-2016-3075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3075"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3075",
"url": "https://www.suse.com/security/cve/CVE-2016-3075"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2016-3075",
"url": "https://bugzilla.suse.com/1123874"
},
{
"category": "external",
"summary": "SUSE Bug 973164 for CVE-2016-3075",
"url": "https://bugzilla.suse.com/973164"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-3075"
},
{
"cve": "CVE-2016-3191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3191"
}
],
"notes": [
{
"category": "general",
"text": "The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3191",
"url": "https://www.suse.com/security/cve/CVE-2016-3191"
},
{
"category": "external",
"summary": "SUSE Bug 971741 for CVE-2016-3191",
"url": "https://bugzilla.suse.com/971741"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-3191"
},
{
"cve": "CVE-2016-3627",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3627"
}
],
"notes": [
{
"category": "general",
"text": "The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3627",
"url": "https://www.suse.com/security/cve/CVE-2016-3627"
},
{
"category": "external",
"summary": "SUSE Bug 1026099 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/1026099"
},
{
"category": "external",
"summary": "SUSE Bug 1026101 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/1026101"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 972335 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/972335"
},
{
"category": "external",
"summary": "SUSE Bug 975947 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/975947"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-3627"
},
{
"cve": "CVE-2016-3705",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3705"
}
],
"notes": [
{
"category": "general",
"text": "The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3705",
"url": "https://www.suse.com/security/cve/CVE-2016-3705"
},
{
"category": "external",
"summary": "SUSE Bug 1017497 for CVE-2016-3705",
"url": "https://bugzilla.suse.com/1017497"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-3705",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 975947 for CVE-2016-3705",
"url": "https://bugzilla.suse.com/975947"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2016-3705"
},
{
"cve": "CVE-2016-3706",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3706"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3706",
"url": "https://www.suse.com/security/cve/CVE-2016-3706"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2016-3706",
"url": "https://bugzilla.suse.com/1123874"
},
{
"category": "external",
"summary": "SUSE Bug 980483 for CVE-2016-3706",
"url": "https://bugzilla.suse.com/980483"
},
{
"category": "external",
"summary": "SUSE Bug 997423 for CVE-2016-3706",
"url": "https://bugzilla.suse.com/997423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-3706"
},
{
"cve": "CVE-2016-4008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4008"
}
],
"notes": [
{
"category": "general",
"text": "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4008",
"url": "https://www.suse.com/security/cve/CVE-2016-4008"
},
{
"category": "external",
"summary": "SUSE Bug 982779 for CVE-2016-4008",
"url": "https://bugzilla.suse.com/982779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-4008"
},
{
"cve": "CVE-2016-4429",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4429"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4429",
"url": "https://www.suse.com/security/cve/CVE-2016-4429"
},
{
"category": "external",
"summary": "SUSE Bug 1081556 for CVE-2016-4429",
"url": "https://bugzilla.suse.com/1081556"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2016-4429",
"url": "https://bugzilla.suse.com/1123874"
},
{
"category": "external",
"summary": "SUSE Bug 980854 for CVE-2016-4429",
"url": "https://bugzilla.suse.com/980854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-4429"
},
{
"cve": "CVE-2016-4447",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4447"
}
],
"notes": [
{
"category": "general",
"text": "The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4447",
"url": "https://www.suse.com/security/cve/CVE-2016-4447"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4447",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981548 for CVE-2016-4447",
"url": "https://bugzilla.suse.com/981548"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-4447"
},
{
"cve": "CVE-2016-4448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4448"
}
],
"notes": [
{
"category": "general",
"text": "Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4448",
"url": "https://www.suse.com/security/cve/CVE-2016-4448"
},
{
"category": "external",
"summary": "SUSE Bug 1010299 for CVE-2016-4448",
"url": "https://bugzilla.suse.com/1010299"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4448",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981549 for CVE-2016-4448",
"url": "https://bugzilla.suse.com/981549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-4448"
},
{
"cve": "CVE-2016-4449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4449"
}
],
"notes": [
{
"category": "general",
"text": "XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4449",
"url": "https://www.suse.com/security/cve/CVE-2016-4449"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4449",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981550 for CVE-2016-4449",
"url": "https://bugzilla.suse.com/981550"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-4449"
},
{
"cve": "CVE-2016-4483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4483"
}
],
"notes": [
{
"category": "general",
"text": "The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4483",
"url": "https://www.suse.com/security/cve/CVE-2016-4483"
},
{
"category": "external",
"summary": "SUSE Bug 1026101 for CVE-2016-4483",
"url": "https://bugzilla.suse.com/1026101"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4483",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 978395 for CVE-2016-4483",
"url": "https://bugzilla.suse.com/978395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-4483"
},
{
"cve": "CVE-2016-4574",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4574"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4574",
"url": "https://www.suse.com/security/cve/CVE-2016-4574"
},
{
"category": "external",
"summary": "SUSE Bug 1135436 for CVE-2016-4574",
"url": "https://bugzilla.suse.com/1135436"
},
{
"category": "external",
"summary": "SUSE Bug 979261 for CVE-2016-4574",
"url": "https://bugzilla.suse.com/979261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2016-4574"
},
{
"cve": "CVE-2016-4579",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4579"
}
],
"notes": [
{
"category": "general",
"text": "Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the \"returned length of the object from _ksba_ber_parse_tl.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4579",
"url": "https://www.suse.com/security/cve/CVE-2016-4579"
},
{
"category": "external",
"summary": "SUSE Bug 1135436 for CVE-2016-4579",
"url": "https://bugzilla.suse.com/1135436"
},
{
"category": "external",
"summary": "SUSE Bug 979906 for CVE-2016-4579",
"url": "https://bugzilla.suse.com/979906"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-4579"
},
{
"cve": "CVE-2016-4658",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4658"
}
],
"notes": [
{
"category": "general",
"text": "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4658",
"url": "https://www.suse.com/security/cve/CVE-2016-4658"
},
{
"category": "external",
"summary": "SUSE Bug 1005544 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1005544"
},
{
"category": "external",
"summary": "SUSE Bug 1014873 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1014873"
},
{
"category": "external",
"summary": "SUSE Bug 1069433 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1069433"
},
{
"category": "external",
"summary": "SUSE Bug 1078813 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1078813"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-4658"
},
{
"cve": "CVE-2016-5011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5011"
}
],
"notes": [
{
"category": "general",
"text": "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5011",
"url": "https://www.suse.com/security/cve/CVE-2016-5011"
},
{
"category": "external",
"summary": "SUSE Bug 988361 for CVE-2016-5011",
"url": "https://bugzilla.suse.com/988361"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-5011"
},
{
"cve": "CVE-2016-5300",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5300"
}
],
"notes": [
{
"category": "general",
"text": "The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5300",
"url": "https://www.suse.com/security/cve/CVE-2016-5300"
},
{
"category": "external",
"summary": "SUSE Bug 983216 for CVE-2016-5300",
"url": "https://bugzilla.suse.com/983216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2016-5300"
},
{
"cve": "CVE-2016-5419",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5419"
}
],
"notes": [
{
"category": "general",
"text": "curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5419",
"url": "https://www.suse.com/security/cve/CVE-2016-5419"
},
{
"category": "external",
"summary": "SUSE Bug 1033413 for CVE-2016-5419",
"url": "https://bugzilla.suse.com/1033413"
},
{
"category": "external",
"summary": "SUSE Bug 1033442 for CVE-2016-5419",
"url": "https://bugzilla.suse.com/1033442"
},
{
"category": "external",
"summary": "SUSE Bug 991389 for CVE-2016-5419",
"url": "https://bugzilla.suse.com/991389"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-5419"
},
{
"cve": "CVE-2016-5420",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5420"
}
],
"notes": [
{
"category": "general",
"text": "curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5420",
"url": "https://www.suse.com/security/cve/CVE-2016-5420"
},
{
"category": "external",
"summary": "SUSE Bug 991390 for CVE-2016-5420",
"url": "https://bugzilla.suse.com/991390"
},
{
"category": "external",
"summary": "SUSE Bug 997420 for CVE-2016-5420",
"url": "https://bugzilla.suse.com/997420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-5420"
},
{
"cve": "CVE-2016-5421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5421"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5421",
"url": "https://www.suse.com/security/cve/CVE-2016-5421"
},
{
"category": "external",
"summary": "SUSE Bug 991391 for CVE-2016-5421",
"url": "https://bugzilla.suse.com/991391"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-5421"
},
{
"cve": "CVE-2016-6185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6185"
}
],
"notes": [
{
"category": "general",
"text": "The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6185",
"url": "https://www.suse.com/security/cve/CVE-2016-6185"
},
{
"category": "external",
"summary": "SUSE Bug 988311 for CVE-2016-6185",
"url": "https://bugzilla.suse.com/988311"
},
{
"category": "external",
"summary": "SUSE Bug 999993 for CVE-2016-6185",
"url": "https://bugzilla.suse.com/999993"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-6185"
},
{
"cve": "CVE-2016-6261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6261"
}
],
"notes": [
{
"category": "general",
"text": "The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6261",
"url": "https://www.suse.com/security/cve/CVE-2016-6261"
},
{
"category": "external",
"summary": "SUSE Bug 1118435 for CVE-2016-6261",
"url": "https://bugzilla.suse.com/1118435"
},
{
"category": "external",
"summary": "SUSE Bug 1173590 for CVE-2016-6261",
"url": "https://bugzilla.suse.com/1173590"
},
{
"category": "external",
"summary": "SUSE Bug 990190 for CVE-2016-6261",
"url": "https://bugzilla.suse.com/990190"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-6261"
},
{
"cve": "CVE-2016-6262",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6262"
}
],
"notes": [
{
"category": "general",
"text": "idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6262",
"url": "https://www.suse.com/security/cve/CVE-2016-6262"
},
{
"category": "external",
"summary": "SUSE Bug 1014473 for CVE-2016-6262",
"url": "https://bugzilla.suse.com/1014473"
},
{
"category": "external",
"summary": "SUSE Bug 1173590 for CVE-2016-6262",
"url": "https://bugzilla.suse.com/1173590"
},
{
"category": "external",
"summary": "SUSE Bug 1190777 for CVE-2016-6262",
"url": "https://bugzilla.suse.com/1190777"
},
{
"category": "external",
"summary": "SUSE Bug 990189 for CVE-2016-6262",
"url": "https://bugzilla.suse.com/990189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-6262"
},
{
"cve": "CVE-2016-6263",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6263"
}
],
"notes": [
{
"category": "general",
"text": "The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6263",
"url": "https://www.suse.com/security/cve/CVE-2016-6263"
},
{
"category": "external",
"summary": "SUSE Bug 1118435 for CVE-2016-6263",
"url": "https://bugzilla.suse.com/1118435"
},
{
"category": "external",
"summary": "SUSE Bug 990191 for CVE-2016-6263",
"url": "https://bugzilla.suse.com/990191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-6263"
},
{
"cve": "CVE-2016-6302",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6302"
}
],
"notes": [
{
"category": "general",
"text": "The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6302",
"url": "https://www.suse.com/security/cve/CVE-2016-6302"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-6302",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-6302",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 995324 for CVE-2016-6302",
"url": "https://bugzilla.suse.com/995324"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-6302",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-6302"
},
{
"cve": "CVE-2016-6303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6303"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6303",
"url": "https://www.suse.com/security/cve/CVE-2016-6303"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 995377 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/995377"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-6303"
},
{
"cve": "CVE-2016-6304",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6304"
}
],
"notes": [
{
"category": "general",
"text": "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6304",
"url": "https://www.suse.com/security/cve/CVE-2016-6304"
},
{
"category": "external",
"summary": "SUSE Bug 1001706 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1001706"
},
{
"category": "external",
"summary": "SUSE Bug 1003811 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1003811"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 1005579 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1005579"
},
{
"category": "external",
"summary": "SUSE Bug 1021375 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1021375"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/999665"
},
{
"category": "external",
"summary": "SUSE Bug 999666 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/999666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-6304"
},
{
"cve": "CVE-2016-6306",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6306"
}
],
"notes": [
{
"category": "general",
"text": "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6306",
"url": "https://www.suse.com/security/cve/CVE-2016-6306"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-6306",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-6306",
"url": "https://bugzilla.suse.com/999665"
},
{
"category": "external",
"summary": "SUSE Bug 999668 for CVE-2016-6306",
"url": "https://bugzilla.suse.com/999668"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-6306"
},
{
"cve": "CVE-2016-6313",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6313"
}
],
"notes": [
{
"category": "general",
"text": "The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6313",
"url": "https://www.suse.com/security/cve/CVE-2016-6313"
},
{
"category": "external",
"summary": "SUSE Bug 1123792 for CVE-2016-6313",
"url": "https://bugzilla.suse.com/1123792"
},
{
"category": "external",
"summary": "SUSE Bug 994157 for CVE-2016-6313",
"url": "https://bugzilla.suse.com/994157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-6313"
},
{
"cve": "CVE-2016-6318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6318"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6318",
"url": "https://www.suse.com/security/cve/CVE-2016-6318"
},
{
"category": "external",
"summary": "SUSE Bug 1123113 for CVE-2016-6318",
"url": "https://bugzilla.suse.com/1123113"
},
{
"category": "external",
"summary": "SUSE Bug 992966 for CVE-2016-6318",
"url": "https://bugzilla.suse.com/992966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-6318"
},
{
"cve": "CVE-2016-7056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7056"
}
],
"notes": [
{
"category": "general",
"text": "A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7056",
"url": "https://www.suse.com/security/cve/CVE-2016-7056"
},
{
"category": "external",
"summary": "SUSE Bug 1005878 for CVE-2016-7056",
"url": "https://bugzilla.suse.com/1005878"
},
{
"category": "external",
"summary": "SUSE Bug 1019334 for CVE-2016-7056",
"url": "https://bugzilla.suse.com/1019334"
},
{
"category": "external",
"summary": "SUSE Bug 1148697 for CVE-2016-7056",
"url": "https://bugzilla.suse.com/1148697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-7056"
},
{
"cve": "CVE-2016-7141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7141"
}
],
"notes": [
{
"category": "general",
"text": "curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7141",
"url": "https://www.suse.com/security/cve/CVE-2016-7141"
},
{
"category": "external",
"summary": "SUSE Bug 991390 for CVE-2016-7141",
"url": "https://bugzilla.suse.com/991390"
},
{
"category": "external",
"summary": "SUSE Bug 997420 for CVE-2016-7141",
"url": "https://bugzilla.suse.com/997420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-7141"
},
{
"cve": "CVE-2016-7167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7167"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7167",
"url": "https://www.suse.com/security/cve/CVE-2016-7167"
},
{
"category": "external",
"summary": "SUSE Bug 998760 for CVE-2016-7167",
"url": "https://bugzilla.suse.com/998760"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-7167"
},
{
"cve": "CVE-2016-7543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7543"
}
],
"notes": [
{
"category": "general",
"text": "Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7543",
"url": "https://www.suse.com/security/cve/CVE-2016-7543"
},
{
"category": "external",
"summary": "SUSE Bug 1001299 for CVE-2016-7543",
"url": "https://bugzilla.suse.com/1001299"
},
{
"category": "external",
"summary": "SUSE Bug 1159416 for CVE-2016-7543",
"url": "https://bugzilla.suse.com/1159416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-7543"
},
{
"cve": "CVE-2016-7796",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7796"
}
],
"notes": [
{
"category": "general",
"text": "The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7796",
"url": "https://www.suse.com/security/cve/CVE-2016-7796"
},
{
"category": "external",
"summary": "SUSE Bug 1001765 for CVE-2016-7796",
"url": "https://bugzilla.suse.com/1001765"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-7796"
},
{
"cve": "CVE-2016-8610",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8610"
}
],
"notes": [
{
"category": "general",
"text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8610",
"url": "https://www.suse.com/security/cve/CVE-2016-8610"
},
{
"category": "external",
"summary": "SUSE Bug 1005878 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/1005878"
},
{
"category": "external",
"summary": "SUSE Bug 1005879 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/1005879"
},
{
"category": "external",
"summary": "SUSE Bug 1110018 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/1110018"
},
{
"category": "external",
"summary": "SUSE Bug 1120592 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/1120592"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/1126909"
},
{
"category": "external",
"summary": "SUSE Bug 1148697 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/1148697"
},
{
"category": "external",
"summary": "SUSE Bug 982575 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/982575"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2016-8610"
},
{
"cve": "CVE-2016-8615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8615"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8615",
"url": "https://www.suse.com/security/cve/CVE-2016-8615"
},
{
"category": "external",
"summary": "SUSE Bug 1005633 for CVE-2016-8615",
"url": "https://bugzilla.suse.com/1005633"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-8615"
},
{
"cve": "CVE-2016-8616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8616"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8616",
"url": "https://www.suse.com/security/cve/CVE-2016-8616"
},
{
"category": "external",
"summary": "SUSE Bug 1005634 for CVE-2016-8616",
"url": "https://bugzilla.suse.com/1005634"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-8616"
},
{
"cve": "CVE-2016-8617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8617"
}
],
"notes": [
{
"category": "general",
"text": "The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8617",
"url": "https://www.suse.com/security/cve/CVE-2016-8617"
},
{
"category": "external",
"summary": "SUSE Bug 1005635 for CVE-2016-8617",
"url": "https://bugzilla.suse.com/1005635"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-8617"
},
{
"cve": "CVE-2016-8618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8618"
}
],
"notes": [
{
"category": "general",
"text": "The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8618",
"url": "https://www.suse.com/security/cve/CVE-2016-8618"
},
{
"category": "external",
"summary": "SUSE Bug 1005637 for CVE-2016-8618",
"url": "https://bugzilla.suse.com/1005637"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-8618"
},
{
"cve": "CVE-2016-8619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8619"
}
],
"notes": [
{
"category": "general",
"text": "The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8619",
"url": "https://www.suse.com/security/cve/CVE-2016-8619"
},
{
"category": "external",
"summary": "SUSE Bug 1005638 for CVE-2016-8619",
"url": "https://bugzilla.suse.com/1005638"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-8619"
},
{
"cve": "CVE-2016-8620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8620"
}
],
"notes": [
{
"category": "general",
"text": "The \u0027globbing\u0027 feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8620",
"url": "https://www.suse.com/security/cve/CVE-2016-8620"
},
{
"category": "external",
"summary": "SUSE Bug 1005640 for CVE-2016-8620",
"url": "https://bugzilla.suse.com/1005640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-8620"
},
{
"cve": "CVE-2016-8621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8621"
}
],
"notes": [
{
"category": "general",
"text": "The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8621",
"url": "https://www.suse.com/security/cve/CVE-2016-8621"
},
{
"category": "external",
"summary": "SUSE Bug 1005642 for CVE-2016-8621",
"url": "https://bugzilla.suse.com/1005642"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-8621"
},
{
"cve": "CVE-2016-8622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8622"
}
],
"notes": [
{
"category": "general",
"text": "The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8622",
"url": "https://www.suse.com/security/cve/CVE-2016-8622"
},
{
"category": "external",
"summary": "SUSE Bug 1005643 for CVE-2016-8622",
"url": "https://bugzilla.suse.com/1005643"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-8622"
},
{
"cve": "CVE-2016-8623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8623"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8623",
"url": "https://www.suse.com/security/cve/CVE-2016-8623"
},
{
"category": "external",
"summary": "SUSE Bug 1005645 for CVE-2016-8623",
"url": "https://bugzilla.suse.com/1005645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-8623"
},
{
"cve": "CVE-2016-8624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8624"
}
],
"notes": [
{
"category": "general",
"text": "curl before version 7.51.0 doesn\u0027t parse the authority component of the URL correctly when the host name part ends with a \u0027#\u0027 character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8624",
"url": "https://www.suse.com/security/cve/CVE-2016-8624"
},
{
"category": "external",
"summary": "SUSE Bug 1005646 for CVE-2016-8624",
"url": "https://bugzilla.suse.com/1005646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-8624"
},
{
"cve": "CVE-2016-9063",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9063"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox \u003c 50.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9063",
"url": "https://www.suse.com/security/cve/CVE-2016-9063"
},
{
"category": "external",
"summary": "SUSE Bug 1009026 for CVE-2016-9063",
"url": "https://bugzilla.suse.com/1009026"
},
{
"category": "external",
"summary": "SUSE Bug 1010424 for CVE-2016-9063",
"url": "https://bugzilla.suse.com/1010424"
},
{
"category": "external",
"summary": "SUSE Bug 1047240 for CVE-2016-9063",
"url": "https://bugzilla.suse.com/1047240"
},
{
"category": "external",
"summary": "SUSE Bug 1123115 for CVE-2016-9063",
"url": "https://bugzilla.suse.com/1123115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2016-9063"
},
{
"cve": "CVE-2016-9318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9318"
}
],
"notes": [
{
"category": "general",
"text": "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9318",
"url": "https://www.suse.com/security/cve/CVE-2016-9318"
},
{
"category": "external",
"summary": "SUSE Bug 1010675 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1010675"
},
{
"category": "external",
"summary": "SUSE Bug 1014873 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1014873"
},
{
"category": "external",
"summary": "SUSE Bug 1019074 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1019074"
},
{
"category": "external",
"summary": "SUSE Bug 1118959 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1118959"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 1126613 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1126613"
},
{
"category": "external",
"summary": "SUSE Bug 1148896 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1148896"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-9318"
},
{
"cve": "CVE-2016-9586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9586"
}
],
"notes": [
{
"category": "general",
"text": "curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl\u0027s implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9586",
"url": "https://www.suse.com/security/cve/CVE-2016-9586"
},
{
"category": "external",
"summary": "SUSE Bug 1015332 for CVE-2016-9586",
"url": "https://bugzilla.suse.com/1015332"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-9586"
},
{
"cve": "CVE-2016-9597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9597"
}
],
"notes": [
{
"category": "general",
"text": "It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression CVE for the same issue as CVE-2016-3705.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9597",
"url": "https://www.suse.com/security/cve/CVE-2016-9597"
},
{
"category": "external",
"summary": "SUSE Bug 1014873 for CVE-2016-9597",
"url": "https://bugzilla.suse.com/1014873"
},
{
"category": "external",
"summary": "SUSE Bug 1017497 for CVE-2016-9597",
"url": "https://bugzilla.suse.com/1017497"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-9597",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-9597"
},
{
"cve": "CVE-2016-9840",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9840"
}
],
"notes": [
{
"category": "general",
"text": "inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9840",
"url": "https://www.suse.com/security/cve/CVE-2016-9840"
},
{
"category": "external",
"summary": "SUSE Bug 1003579 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1003579"
},
{
"category": "external",
"summary": "SUSE Bug 1022633 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1022633"
},
{
"category": "external",
"summary": "SUSE Bug 1023215 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1023215"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1038505"
},
{
"category": "external",
"summary": "SUSE Bug 1062104 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1062104"
},
{
"category": "external",
"summary": "SUSE Bug 1120866 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1120866"
},
{
"category": "external",
"summary": "SUSE Bug 1123150 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1123150"
},
{
"category": "external",
"summary": "SUSE Bug 1127473 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1127473"
},
{
"category": "external",
"summary": "SUSE Bug 1184301 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1184301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2016-9840"
},
{
"cve": "CVE-2016-9841",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9841"
}
],
"notes": [
{
"category": "general",
"text": "inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9841",
"url": "https://www.suse.com/security/cve/CVE-2016-9841"
},
{
"category": "external",
"summary": "SUSE Bug 1003579 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1003579"
},
{
"category": "external",
"summary": "SUSE Bug 1022633 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1022633"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1038505"
},
{
"category": "external",
"summary": "SUSE Bug 1064070 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1064070"
},
{
"category": "external",
"summary": "SUSE Bug 1070162 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1070162"
},
{
"category": "external",
"summary": "SUSE Bug 1120866 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1120866"
},
{
"category": "external",
"summary": "SUSE Bug 1123150 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1123150"
},
{
"category": "external",
"summary": "SUSE Bug 1127473 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1127473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2016-9841"
},
{
"cve": "CVE-2016-9842",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9842"
}
],
"notes": [
{
"category": "general",
"text": "The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9842",
"url": "https://www.suse.com/security/cve/CVE-2016-9842"
},
{
"category": "external",
"summary": "SUSE Bug 1003580 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1003580"
},
{
"category": "external",
"summary": "SUSE Bug 1022633 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1022633"
},
{
"category": "external",
"summary": "SUSE Bug 1023215 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1023215"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1038505"
},
{
"category": "external",
"summary": "SUSE Bug 1062104 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1062104"
},
{
"category": "external",
"summary": "SUSE Bug 1120866 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1120866"
},
{
"category": "external",
"summary": "SUSE Bug 1123150 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1123150"
},
{
"category": "external",
"summary": "SUSE Bug 1127473 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1127473"
},
{
"category": "external",
"summary": "SUSE Bug 1184301 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1184301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-9842"
},
{
"cve": "CVE-2016-9843",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9843"
}
],
"notes": [
{
"category": "general",
"text": "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9843",
"url": "https://www.suse.com/security/cve/CVE-2016-9843"
},
{
"category": "external",
"summary": "SUSE Bug 1003580 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1003580"
},
{
"category": "external",
"summary": "SUSE Bug 1013882 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1013882"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1038505"
},
{
"category": "external",
"summary": "SUSE Bug 1062104 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1062104"
},
{
"category": "external",
"summary": "SUSE Bug 1116686 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1116686"
},
{
"category": "external",
"summary": "SUSE Bug 1120866 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1120866"
},
{
"category": "external",
"summary": "SUSE Bug 1123150 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1123150"
},
{
"category": "external",
"summary": "SUSE Bug 1127473 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1127473"
},
{
"category": "external",
"summary": "SUSE Bug 1184301 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1184301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-9843"
},
{
"cve": "CVE-2017-1000100",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000100"
}
],
"notes": [
{
"category": "general",
"text": "When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn\u0027t restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl\u0027s redirect protocols with --proto-redir and libcurl\u0027s with CURLOPT_REDIR_PROTOCOLS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000100",
"url": "https://www.suse.com/security/cve/CVE-2017-1000100"
},
{
"category": "external",
"summary": "SUSE Bug 1051644 for CVE-2017-1000100",
"url": "https://bugzilla.suse.com/1051644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-1000100"
},
{
"cve": "CVE-2017-1000101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000101"
}
],
"notes": [
{
"category": "general",
"text": "curl supports \"globbing\" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000101",
"url": "https://www.suse.com/security/cve/CVE-2017-1000101"
},
{
"category": "external",
"summary": "SUSE Bug 1051643 for CVE-2017-1000101",
"url": "https://bugzilla.suse.com/1051643"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-1000101"
},
{
"cve": "CVE-2017-1000366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000366"
}
],
"notes": [
{
"category": "general",
"text": "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000366",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366"
},
{
"category": "external",
"summary": "SUSE Bug 1037551 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1037551"
},
{
"category": "external",
"summary": "SUSE Bug 1039357 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1039357"
},
{
"category": "external",
"summary": "SUSE Bug 1063847 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1063847"
},
{
"category": "external",
"summary": "SUSE Bug 1071319 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1071319"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1123874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2017-1000366"
},
{
"cve": "CVE-2017-10684",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10684"
}
],
"notes": [
{
"category": "general",
"text": "In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10684",
"url": "https://www.suse.com/security/cve/CVE-2017-10684"
},
{
"category": "external",
"summary": "SUSE Bug 1046858 for CVE-2017-10684",
"url": "https://bugzilla.suse.com/1046858"
},
{
"category": "external",
"summary": "SUSE Bug 1115932 for CVE-2017-10684",
"url": "https://bugzilla.suse.com/1115932"
},
{
"category": "external",
"summary": "SUSE Bug 1175501 for CVE-2017-10684",
"url": "https://bugzilla.suse.com/1175501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-10684"
},
{
"cve": "CVE-2017-10685",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10685"
}
],
"notes": [
{
"category": "general",
"text": "In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10685",
"url": "https://www.suse.com/security/cve/CVE-2017-10685"
},
{
"category": "external",
"summary": "SUSE Bug 1046853 for CVE-2017-10685",
"url": "https://bugzilla.suse.com/1046853"
},
{
"category": "external",
"summary": "SUSE Bug 1115932 for CVE-2017-10685",
"url": "https://bugzilla.suse.com/1115932"
},
{
"category": "external",
"summary": "SUSE Bug 1175501 for CVE-2017-10685",
"url": "https://bugzilla.suse.com/1175501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-10685"
},
{
"cve": "CVE-2017-11112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11112"
}
],
"notes": [
{
"category": "general",
"text": "In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11112",
"url": "https://www.suse.com/security/cve/CVE-2017-11112"
},
{
"category": "external",
"summary": "SUSE Bug 1046853 for CVE-2017-11112",
"url": "https://bugzilla.suse.com/1046853"
},
{
"category": "external",
"summary": "SUSE Bug 1047964 for CVE-2017-11112",
"url": "https://bugzilla.suse.com/1047964"
},
{
"category": "external",
"summary": "SUSE Bug 1175501 for CVE-2017-11112",
"url": "https://bugzilla.suse.com/1175501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-11112"
},
{
"cve": "CVE-2017-11113",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11113"
}
],
"notes": [
{
"category": "general",
"text": "In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11113",
"url": "https://www.suse.com/security/cve/CVE-2017-11113"
},
{
"category": "external",
"summary": "SUSE Bug 1046853 for CVE-2017-11113",
"url": "https://bugzilla.suse.com/1046853"
},
{
"category": "external",
"summary": "SUSE Bug 1047965 for CVE-2017-11113",
"url": "https://bugzilla.suse.com/1047965"
},
{
"category": "external",
"summary": "SUSE Bug 1175501 for CVE-2017-11113",
"url": "https://bugzilla.suse.com/1175501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-11113"
},
{
"cve": "CVE-2017-2616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2616"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2616",
"url": "https://www.suse.com/security/cve/CVE-2017-2616"
},
{
"category": "external",
"summary": "SUSE Bug 1023041 for CVE-2017-2616",
"url": "https://bugzilla.suse.com/1023041"
},
{
"category": "external",
"summary": "SUSE Bug 1123789 for CVE-2017-2616",
"url": "https://bugzilla.suse.com/1123789"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2017-2616"
},
{
"cve": "CVE-2017-3731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3731"
}
],
"notes": [
{
"category": "general",
"text": "If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3731",
"url": "https://www.suse.com/security/cve/CVE-2017-3731"
},
{
"category": "external",
"summary": "SUSE Bug 1021641 for CVE-2017-3731",
"url": "https://bugzilla.suse.com/1021641"
},
{
"category": "external",
"summary": "SUSE Bug 1022085 for CVE-2017-3731",
"url": "https://bugzilla.suse.com/1022085"
},
{
"category": "external",
"summary": "SUSE Bug 1064118 for CVE-2017-3731",
"url": "https://bugzilla.suse.com/1064118"
},
{
"category": "external",
"summary": "SUSE Bug 1064119 for CVE-2017-3731",
"url": "https://bugzilla.suse.com/1064119"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-3731"
},
{
"cve": "CVE-2017-6507",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6507"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle \u0027restart\u0027 operations removing AppArmor profiles that aren\u0027t found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what\u0027s done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6507",
"url": "https://www.suse.com/security/cve/CVE-2017-6507"
},
{
"category": "external",
"summary": "SUSE Bug 1029696 for CVE-2017-6507",
"url": "https://bugzilla.suse.com/1029696"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-6507"
},
{
"cve": "CVE-2017-7407",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7407"
}
],
"notes": [
{
"category": "general",
"text": "The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a \u0027%\u0027 character, which leads to a heap-based buffer over-read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7407",
"url": "https://www.suse.com/security/cve/CVE-2017-7407"
},
{
"category": "external",
"summary": "SUSE Bug 1032309 for CVE-2017-7407",
"url": "https://bugzilla.suse.com/1032309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2017-7407"
},
{
"cve": "CVE-2017-7526",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7526"
}
],
"notes": [
{
"category": "general",
"text": "libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7526",
"url": "https://www.suse.com/security/cve/CVE-2017-7526"
},
{
"category": "external",
"summary": "SUSE Bug 1046607 for CVE-2017-7526",
"url": "https://bugzilla.suse.com/1046607"
},
{
"category": "external",
"summary": "SUSE Bug 1047462 for CVE-2017-7526",
"url": "https://bugzilla.suse.com/1047462"
},
{
"category": "external",
"summary": "SUSE Bug 1123792 for CVE-2017-7526",
"url": "https://bugzilla.suse.com/1123792"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2017-7526"
},
{
"cve": "CVE-2017-9047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9047"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. The variable len is assigned strlen(buf). If the content-\u003etype is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content-\u003eprefix is appended to buf (if it actually fits) whereupon (ii) content-\u003ename is written to the buffer. However, the check for whether the content-\u003ename actually fits also uses \u0027len\u0027 rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9047",
"url": "https://www.suse.com/security/cve/CVE-2017-9047"
},
{
"category": "external",
"summary": "SUSE Bug 1039063 for CVE-2017-9047",
"url": "https://bugzilla.suse.com/1039063"
},
{
"category": "external",
"summary": "SUSE Bug 1039066 for CVE-2017-9047",
"url": "https://bugzilla.suse.com/1039066"
},
{
"category": "external",
"summary": "SUSE Bug 1039657 for CVE-2017-9047",
"url": "https://bugzilla.suse.com/1039657"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2017-9047",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-9047"
},
{
"cve": "CVE-2017-9048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9048"
}
],
"notes": [
{
"category": "general",
"text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 \u003c size. This vulnerability causes programs that use libxml2, such as PHP, to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9048",
"url": "https://www.suse.com/security/cve/CVE-2017-9048"
},
{
"category": "external",
"summary": "SUSE Bug 1039064 for CVE-2017-9048",
"url": "https://bugzilla.suse.com/1039064"
},
{
"category": "external",
"summary": "SUSE Bug 1039066 for CVE-2017-9048",
"url": "https://bugzilla.suse.com/1039066"
},
{
"category": "external",
"summary": "SUSE Bug 1039658 for CVE-2017-9048",
"url": "https://bugzilla.suse.com/1039658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-9048"
},
{
"cve": "CVE-2017-9049",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9049"
}
],
"notes": [
{
"category": "general",
"text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9049",
"url": "https://www.suse.com/security/cve/CVE-2017-9049"
},
{
"category": "external",
"summary": "SUSE Bug 1039063 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039063"
},
{
"category": "external",
"summary": "SUSE Bug 1039064 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039064"
},
{
"category": "external",
"summary": "SUSE Bug 1039066 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039066"
},
{
"category": "external",
"summary": "SUSE Bug 1039659 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039659"
},
{
"category": "external",
"summary": "SUSE Bug 1039661 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039661"
},
{
"category": "external",
"summary": "SUSE Bug 1069690 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1069690"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2017-9049"
},
{
"cve": "CVE-2017-9050",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9050"
}
],
"notes": [
{
"category": "general",
"text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9050",
"url": "https://www.suse.com/security/cve/CVE-2017-9050"
},
{
"category": "external",
"summary": "SUSE Bug 1039066 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1039066"
},
{
"category": "external",
"summary": "SUSE Bug 1039069 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1039069"
},
{
"category": "external",
"summary": "SUSE Bug 1039661 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1039661"
},
{
"category": "external",
"summary": "SUSE Bug 1069433 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1069433"
},
{
"category": "external",
"summary": "SUSE Bug 1069690 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1069690"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-9050"
},
{
"cve": "CVE-2017-9233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9233"
}
],
"notes": [
{
"category": "general",
"text": "XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9233",
"url": "https://www.suse.com/security/cve/CVE-2017-9233"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1047236 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/1047236"
},
{
"category": "external",
"summary": "SUSE Bug 1073350 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/1073350"
},
{
"category": "external",
"summary": "SUSE Bug 1123115 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/1123115"
},
{
"category": "external",
"summary": "SUSE Bug 983216 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/983216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2017-9233"
}
]
}
SUSE-SU-2017:1619-1
Vulnerability from csaf_suse - Published: 2017-06-19 15:19 - Updated: 2017-06-19 15:19Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for glibc",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for glibc fixes the following issues:\n\n- CVE-2017-1000366: Fix a potential privilege escalation vulnerability that\n allowed unprivileged system users to manipulate the stack of setuid binaries\n to gain special privileges. [bsc#1039357]\n\n- A bug in glibc that could result in deadlocks between malloc() and fork() has\n been fixed. [bsc#1040043]\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-990,SUSE-SLE-DESKTOP-12-SP2-2017-990,SUSE-SLE-RPI-12-SP2-2017-990,SUSE-SLE-SDK-12-SP2-2017-990,SUSE-SLE-SERVER-12-SP2-2017-990",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1619-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:1619-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171619-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:1619-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-June/002962.html"
},
{
"category": "self",
"summary": "SUSE Bug 1039357",
"url": "https://bugzilla.suse.com/1039357"
},
{
"category": "self",
"summary": "SUSE Bug 1040043",
"url": "https://bugzilla.suse.com/1040043"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000366 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366/"
}
],
"title": "Security update for glibc",
"tracking": {
"current_release_date": "2017-06-19T15:19:58Z",
"generator": {
"date": "2017-06-19T15:19:58Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:1619-1",
"initial_release_date": "2017-06-19T15:19:58Z",
"revision_history": [
{
"date": "2017-06-19T15:19:58Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.22-61.3.aarch64",
"product": {
"name": "glibc-2.22-61.3.aarch64",
"product_id": "glibc-2.22-61.3.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.22-61.3.aarch64",
"product": {
"name": "glibc-devel-2.22-61.3.aarch64",
"product_id": "glibc-devel-2.22-61.3.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.22-61.3.aarch64",
"product": {
"name": "glibc-locale-2.22-61.3.aarch64",
"product_id": "glibc-locale-2.22-61.3.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-profile-2.22-61.3.aarch64",
"product": {
"name": "glibc-profile-2.22-61.3.aarch64",
"product_id": "glibc-profile-2.22-61.3.aarch64"
}
},
{
"category": "product_version",
"name": "nscd-2.22-61.3.aarch64",
"product": {
"name": "nscd-2.22-61.3.aarch64",
"product_id": "nscd-2.22-61.3.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-devel-static-2.22-61.3.aarch64",
"product": {
"name": "glibc-devel-static-2.22-61.3.aarch64",
"product_id": "glibc-devel-static-2.22-61.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-i18ndata-2.22-61.3.noarch",
"product": {
"name": "glibc-i18ndata-2.22-61.3.noarch",
"product_id": "glibc-i18ndata-2.22-61.3.noarch"
}
},
{
"category": "product_version",
"name": "glibc-html-2.22-61.3.noarch",
"product": {
"name": "glibc-html-2.22-61.3.noarch",
"product_id": "glibc-html-2.22-61.3.noarch"
}
},
{
"category": "product_version",
"name": "glibc-info-2.22-61.3.noarch",
"product": {
"name": "glibc-info-2.22-61.3.noarch",
"product_id": "glibc-info-2.22-61.3.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-devel-static-2.22-61.3.ppc64le",
"product": {
"name": "glibc-devel-static-2.22-61.3.ppc64le",
"product_id": "glibc-devel-static-2.22-61.3.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-2.22-61.3.ppc64le",
"product": {
"name": "glibc-2.22-61.3.ppc64le",
"product_id": "glibc-2.22-61.3.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.22-61.3.ppc64le",
"product": {
"name": "glibc-devel-2.22-61.3.ppc64le",
"product_id": "glibc-devel-2.22-61.3.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.22-61.3.ppc64le",
"product": {
"name": "glibc-locale-2.22-61.3.ppc64le",
"product_id": "glibc-locale-2.22-61.3.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-profile-2.22-61.3.ppc64le",
"product": {
"name": "glibc-profile-2.22-61.3.ppc64le",
"product_id": "glibc-profile-2.22-61.3.ppc64le"
}
},
{
"category": "product_version",
"name": "nscd-2.22-61.3.ppc64le",
"product": {
"name": "nscd-2.22-61.3.ppc64le",
"product_id": "nscd-2.22-61.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-devel-static-2.22-61.3.s390x",
"product": {
"name": "glibc-devel-static-2.22-61.3.s390x",
"product_id": "glibc-devel-static-2.22-61.3.s390x"
}
},
{
"category": "product_version",
"name": "glibc-2.22-61.3.s390x",
"product": {
"name": "glibc-2.22-61.3.s390x",
"product_id": "glibc-2.22-61.3.s390x"
}
},
{
"category": "product_version",
"name": "glibc-32bit-2.22-61.3.s390x",
"product": {
"name": "glibc-32bit-2.22-61.3.s390x",
"product_id": "glibc-32bit-2.22-61.3.s390x"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.22-61.3.s390x",
"product": {
"name": "glibc-devel-2.22-61.3.s390x",
"product_id": "glibc-devel-2.22-61.3.s390x"
}
},
{
"category": "product_version",
"name": "glibc-devel-32bit-2.22-61.3.s390x",
"product": {
"name": "glibc-devel-32bit-2.22-61.3.s390x",
"product_id": "glibc-devel-32bit-2.22-61.3.s390x"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.22-61.3.s390x",
"product": {
"name": "glibc-locale-2.22-61.3.s390x",
"product_id": "glibc-locale-2.22-61.3.s390x"
}
},
{
"category": "product_version",
"name": "glibc-locale-32bit-2.22-61.3.s390x",
"product": {
"name": "glibc-locale-32bit-2.22-61.3.s390x",
"product_id": "glibc-locale-32bit-2.22-61.3.s390x"
}
},
{
"category": "product_version",
"name": "glibc-profile-2.22-61.3.s390x",
"product": {
"name": "glibc-profile-2.22-61.3.s390x",
"product_id": "glibc-profile-2.22-61.3.s390x"
}
},
{
"category": "product_version",
"name": "glibc-profile-32bit-2.22-61.3.s390x",
"product": {
"name": "glibc-profile-32bit-2.22-61.3.s390x",
"product_id": "glibc-profile-32bit-2.22-61.3.s390x"
}
},
{
"category": "product_version",
"name": "nscd-2.22-61.3.s390x",
"product": {
"name": "nscd-2.22-61.3.s390x",
"product_id": "nscd-2.22-61.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.22-61.3.x86_64",
"product": {
"name": "glibc-2.22-61.3.x86_64",
"product_id": "glibc-2.22-61.3.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-32bit-2.22-61.3.x86_64",
"product": {
"name": "glibc-32bit-2.22-61.3.x86_64",
"product_id": "glibc-32bit-2.22-61.3.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.22-61.3.x86_64",
"product": {
"name": "glibc-devel-2.22-61.3.x86_64",
"product_id": "glibc-devel-2.22-61.3.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-devel-32bit-2.22-61.3.x86_64",
"product": {
"name": "glibc-devel-32bit-2.22-61.3.x86_64",
"product_id": "glibc-devel-32bit-2.22-61.3.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.22-61.3.x86_64",
"product": {
"name": "glibc-locale-2.22-61.3.x86_64",
"product_id": "glibc-locale-2.22-61.3.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-locale-32bit-2.22-61.3.x86_64",
"product": {
"name": "glibc-locale-32bit-2.22-61.3.x86_64",
"product_id": "glibc-locale-32bit-2.22-61.3.x86_64"
}
},
{
"category": "product_version",
"name": "nscd-2.22-61.3.x86_64",
"product": {
"name": "nscd-2.22-61.3.x86_64",
"product_id": "nscd-2.22-61.3.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-devel-static-2.22-61.3.x86_64",
"product": {
"name": "glibc-devel-static-2.22-61.3.x86_64",
"product_id": "glibc-devel-static-2.22-61.3.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-profile-2.22-61.3.x86_64",
"product": {
"name": "glibc-profile-2.22-61.3.x86_64",
"product_id": "glibc-profile-2.22-61.3.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-profile-32bit-2.22-61.3.x86_64",
"product": {
"name": "glibc-profile-32bit-2.22-61.3.x86_64",
"product_id": "glibc-profile-32bit-2.22-61.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:glibc-2.22-61.3.x86_64"
},
"product_reference": "glibc-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:glibc-32bit-2.22-61.3.x86_64"
},
"product_reference": "glibc-32bit-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:glibc-devel-2.22-61.3.x86_64"
},
"product_reference": "glibc-devel-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:glibc-devel-32bit-2.22-61.3.x86_64"
},
"product_reference": "glibc-devel-32bit-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.22-61.3.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:glibc-i18ndata-2.22-61.3.noarch"
},
"product_reference": "glibc-i18ndata-2.22-61.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:glibc-locale-2.22-61.3.x86_64"
},
"product_reference": "glibc-locale-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:glibc-locale-32bit-2.22-61.3.x86_64"
},
"product_reference": "glibc-locale-32bit-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:nscd-2.22-61.3.x86_64"
},
"product_reference": "nscd-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.22-61.3.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-2.22-61.3.aarch64"
},
"product_reference": "glibc-2.22-61.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.22-61.3.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-devel-2.22-61.3.aarch64"
},
"product_reference": "glibc-devel-2.22-61.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.22-61.3.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-html-2.22-61.3.noarch"
},
"product_reference": "glibc-html-2.22-61.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.22-61.3.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-i18ndata-2.22-61.3.noarch"
},
"product_reference": "glibc-i18ndata-2.22-61.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.22-61.3.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-info-2.22-61.3.noarch"
},
"product_reference": "glibc-info-2.22-61.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.22-61.3.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-locale-2.22-61.3.aarch64"
},
"product_reference": "glibc-locale-2.22-61.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.22-61.3.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-profile-2.22-61.3.aarch64"
},
"product_reference": "glibc-profile-2.22-61.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.22-61.3.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:nscd-2.22-61.3.aarch64"
},
"product_reference": "nscd-2.22-61.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-static-2.22-61.3.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-devel-static-2.22-61.3.aarch64"
},
"product_reference": "glibc-devel-static-2.22-61.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-static-2.22-61.3.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-devel-static-2.22-61.3.ppc64le"
},
"product_reference": "glibc-devel-static-2.22-61.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-static-2.22-61.3.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-devel-static-2.22-61.3.s390x"
},
"product_reference": "glibc-devel-static-2.22-61.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-static-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-devel-static-2.22-61.3.x86_64"
},
"product_reference": "glibc-devel-static-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.22-61.3.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-info-2.22-61.3.noarch"
},
"product_reference": "glibc-info-2.22-61.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.22-61.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-2.22-61.3.aarch64"
},
"product_reference": "glibc-2.22-61.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.22-61.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-2.22-61.3.ppc64le"
},
"product_reference": "glibc-2.22-61.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.22-61.3.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-2.22-61.3.s390x"
},
"product_reference": "glibc-2.22-61.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-2.22-61.3.x86_64"
},
"product_reference": "glibc-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.22-61.3.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-32bit-2.22-61.3.s390x"
},
"product_reference": "glibc-32bit-2.22-61.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-32bit-2.22-61.3.x86_64"
},
"product_reference": "glibc-32bit-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.22-61.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-devel-2.22-61.3.aarch64"
},
"product_reference": "glibc-devel-2.22-61.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.22-61.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-devel-2.22-61.3.ppc64le"
},
"product_reference": "glibc-devel-2.22-61.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.22-61.3.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-devel-2.22-61.3.s390x"
},
"product_reference": "glibc-devel-2.22-61.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-devel-2.22-61.3.x86_64"
},
"product_reference": "glibc-devel-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.22-61.3.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-devel-32bit-2.22-61.3.s390x"
},
"product_reference": "glibc-devel-32bit-2.22-61.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-devel-32bit-2.22-61.3.x86_64"
},
"product_reference": "glibc-devel-32bit-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.22-61.3.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-html-2.22-61.3.noarch"
},
"product_reference": "glibc-html-2.22-61.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.22-61.3.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-i18ndata-2.22-61.3.noarch"
},
"product_reference": "glibc-i18ndata-2.22-61.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.22-61.3.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-info-2.22-61.3.noarch"
},
"product_reference": "glibc-info-2.22-61.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.22-61.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-locale-2.22-61.3.aarch64"
},
"product_reference": "glibc-locale-2.22-61.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.22-61.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-locale-2.22-61.3.ppc64le"
},
"product_reference": "glibc-locale-2.22-61.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.22-61.3.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-locale-2.22-61.3.s390x"
},
"product_reference": "glibc-locale-2.22-61.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-locale-2.22-61.3.x86_64"
},
"product_reference": "glibc-locale-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.22-61.3.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-locale-32bit-2.22-61.3.s390x"
},
"product_reference": "glibc-locale-32bit-2.22-61.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-locale-32bit-2.22-61.3.x86_64"
},
"product_reference": "glibc-locale-32bit-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.22-61.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-profile-2.22-61.3.aarch64"
},
"product_reference": "glibc-profile-2.22-61.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.22-61.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-profile-2.22-61.3.ppc64le"
},
"product_reference": "glibc-profile-2.22-61.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.22-61.3.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-profile-2.22-61.3.s390x"
},
"product_reference": "glibc-profile-2.22-61.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-profile-2.22-61.3.x86_64"
},
"product_reference": "glibc-profile-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.22-61.3.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-profile-32bit-2.22-61.3.s390x"
},
"product_reference": "glibc-profile-32bit-2.22-61.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:glibc-profile-32bit-2.22-61.3.x86_64"
},
"product_reference": "glibc-profile-32bit-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.22-61.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:nscd-2.22-61.3.aarch64"
},
"product_reference": "nscd-2.22-61.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.22-61.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:nscd-2.22-61.3.ppc64le"
},
"product_reference": "nscd-2.22-61.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.22-61.3.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:nscd-2.22-61.3.s390x"
},
"product_reference": "nscd-2.22-61.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:nscd-2.22-61.3.x86_64"
},
"product_reference": "nscd-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.22-61.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-2.22-61.3.aarch64"
},
"product_reference": "glibc-2.22-61.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.22-61.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-2.22-61.3.ppc64le"
},
"product_reference": "glibc-2.22-61.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.22-61.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-2.22-61.3.s390x"
},
"product_reference": "glibc-2.22-61.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-2.22-61.3.x86_64"
},
"product_reference": "glibc-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.22-61.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-32bit-2.22-61.3.s390x"
},
"product_reference": "glibc-32bit-2.22-61.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-32bit-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-32bit-2.22-61.3.x86_64"
},
"product_reference": "glibc-32bit-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.22-61.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-2.22-61.3.aarch64"
},
"product_reference": "glibc-devel-2.22-61.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.22-61.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-2.22-61.3.ppc64le"
},
"product_reference": "glibc-devel-2.22-61.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.22-61.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-2.22-61.3.s390x"
},
"product_reference": "glibc-devel-2.22-61.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-2.22-61.3.x86_64"
},
"product_reference": "glibc-devel-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.22-61.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-32bit-2.22-61.3.s390x"
},
"product_reference": "glibc-devel-32bit-2.22-61.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-32bit-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-32bit-2.22-61.3.x86_64"
},
"product_reference": "glibc-devel-32bit-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.22-61.3.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-html-2.22-61.3.noarch"
},
"product_reference": "glibc-html-2.22-61.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.22-61.3.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-i18ndata-2.22-61.3.noarch"
},
"product_reference": "glibc-i18ndata-2.22-61.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.22-61.3.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-info-2.22-61.3.noarch"
},
"product_reference": "glibc-info-2.22-61.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.22-61.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-2.22-61.3.aarch64"
},
"product_reference": "glibc-locale-2.22-61.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.22-61.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-2.22-61.3.ppc64le"
},
"product_reference": "glibc-locale-2.22-61.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.22-61.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-2.22-61.3.s390x"
},
"product_reference": "glibc-locale-2.22-61.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-2.22-61.3.x86_64"
},
"product_reference": "glibc-locale-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.22-61.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-32bit-2.22-61.3.s390x"
},
"product_reference": "glibc-locale-32bit-2.22-61.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-32bit-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-32bit-2.22-61.3.x86_64"
},
"product_reference": "glibc-locale-32bit-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.22-61.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-2.22-61.3.aarch64"
},
"product_reference": "glibc-profile-2.22-61.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.22-61.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-2.22-61.3.ppc64le"
},
"product_reference": "glibc-profile-2.22-61.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.22-61.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-2.22-61.3.s390x"
},
"product_reference": "glibc-profile-2.22-61.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-2.22-61.3.x86_64"
},
"product_reference": "glibc-profile-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.22-61.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-32bit-2.22-61.3.s390x"
},
"product_reference": "glibc-profile-32bit-2.22-61.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-32bit-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-32bit-2.22-61.3.x86_64"
},
"product_reference": "glibc-profile-32bit-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.22-61.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:nscd-2.22-61.3.aarch64"
},
"product_reference": "nscd-2.22-61.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.22-61.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:nscd-2.22-61.3.ppc64le"
},
"product_reference": "nscd-2.22-61.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.22-61.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:nscd-2.22-61.3.s390x"
},
"product_reference": "nscd-2.22-61.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.22-61.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:nscd-2.22-61.3.x86_64"
},
"product_reference": "nscd-2.22-61.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-1000366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000366"
}
],
"notes": [
{
"category": "general",
"text": "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:glibc-2.22-61.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:glibc-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:glibc-devel-2.22-61.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:glibc-devel-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:glibc-i18ndata-2.22-61.3.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:glibc-locale-2.22-61.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:glibc-locale-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:nscd-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:glibc-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:glibc-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-devel-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:glibc-devel-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:glibc-devel-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-devel-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-devel-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-devel-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-html-2.22-61.3.noarch",
"SUSE Linux Enterprise Server 12 SP2:glibc-i18ndata-2.22-61.3.noarch",
"SUSE Linux Enterprise Server 12 SP2:glibc-info-2.22-61.3.noarch",
"SUSE Linux Enterprise Server 12 SP2:glibc-locale-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:glibc-locale-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:glibc-locale-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-locale-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-locale-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-locale-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-profile-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:glibc-profile-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:glibc-profile-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-profile-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-profile-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-profile-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:nscd-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:nscd-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:nscd-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:nscd-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-devel-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-html-2.22-61.3.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-i18ndata-2.22-61.3.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-info-2.22-61.3.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-locale-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-profile-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:nscd-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-html-2.22-61.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-i18ndata-2.22-61.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-info-2.22-61.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nscd-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nscd-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nscd-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nscd-2.22-61.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-devel-static-2.22-61.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-devel-static-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-devel-static-2.22-61.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-devel-static-2.22-61.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-info-2.22-61.3.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000366",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366"
},
{
"category": "external",
"summary": "SUSE Bug 1037551 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1037551"
},
{
"category": "external",
"summary": "SUSE Bug 1039357 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1039357"
},
{
"category": "external",
"summary": "SUSE Bug 1063847 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1063847"
},
{
"category": "external",
"summary": "SUSE Bug 1071319 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1071319"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1123874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:glibc-2.22-61.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:glibc-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:glibc-devel-2.22-61.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:glibc-devel-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:glibc-i18ndata-2.22-61.3.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:glibc-locale-2.22-61.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:glibc-locale-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:nscd-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:glibc-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:glibc-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-devel-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:glibc-devel-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:glibc-devel-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-devel-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-devel-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-devel-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-html-2.22-61.3.noarch",
"SUSE Linux Enterprise Server 12 SP2:glibc-i18ndata-2.22-61.3.noarch",
"SUSE Linux Enterprise Server 12 SP2:glibc-info-2.22-61.3.noarch",
"SUSE Linux Enterprise Server 12 SP2:glibc-locale-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:glibc-locale-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:glibc-locale-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-locale-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-locale-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-locale-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-profile-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:glibc-profile-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:glibc-profile-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-profile-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-profile-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-profile-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:nscd-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:nscd-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:nscd-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:nscd-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-devel-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-html-2.22-61.3.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-i18ndata-2.22-61.3.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-info-2.22-61.3.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-locale-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-profile-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:nscd-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-html-2.22-61.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-i18ndata-2.22-61.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-info-2.22-61.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nscd-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nscd-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nscd-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nscd-2.22-61.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-devel-static-2.22-61.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-devel-static-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-devel-static-2.22-61.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-devel-static-2.22-61.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-info-2.22-61.3.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:glibc-2.22-61.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:glibc-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:glibc-devel-2.22-61.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:glibc-devel-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:glibc-i18ndata-2.22-61.3.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:glibc-locale-2.22-61.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:glibc-locale-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:nscd-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:glibc-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:glibc-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-devel-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:glibc-devel-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:glibc-devel-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-devel-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-devel-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-devel-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-html-2.22-61.3.noarch",
"SUSE Linux Enterprise Server 12 SP2:glibc-i18ndata-2.22-61.3.noarch",
"SUSE Linux Enterprise Server 12 SP2:glibc-info-2.22-61.3.noarch",
"SUSE Linux Enterprise Server 12 SP2:glibc-locale-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:glibc-locale-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:glibc-locale-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-locale-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-locale-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-locale-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-profile-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:glibc-profile-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:glibc-profile-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-profile-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:glibc-profile-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:glibc-profile-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:nscd-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:nscd-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:nscd-2.22-61.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:nscd-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-devel-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-html-2.22-61.3.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-i18ndata-2.22-61.3.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-info-2.22-61.3.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-locale-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:glibc-profile-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:nscd-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-devel-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-html-2.22-61.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-i18ndata-2.22-61.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-info-2.22-61.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-locale-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-32bit-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:glibc-profile-32bit-2.22-61.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nscd-2.22-61.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nscd-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nscd-2.22-61.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:nscd-2.22-61.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-devel-static-2.22-61.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-devel-static-2.22-61.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-devel-static-2.22-61.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-devel-static-2.22-61.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:glibc-info-2.22-61.3.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-06-19T15:19:58Z",
"details": "important"
}
],
"title": "CVE-2017-1000366"
}
]
}
CNVD-2017-15534
Vulnerability from cnvd - Published: 2017-07-20用户可联系供应商获得补丁信息: http://www.gnu.org/
| Name | GNU glibc <=2.2.5 |
|---|
{
"bids": {
"bid": {
"bidNumber": "99127"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2017-1000366"
}
},
"description": "glibc\uff08\u53c8\u540dGNU C Library\uff0clibc6\uff09\u662f\u4e00\u79cd\u6309\u7167LGPL\u8bb8\u53ef\u534f\u8bae\u53d1\u5e03\u7684\u5f00\u6e90\u514d\u8d39\u7684C\u8bed\u8a00\u7f16\u8bd1\u7a0b\u5e8f\u3002\r\n\r\nglibc 2.25\u53ca\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"discovererName": "Qualys Research Labs",
"formalWay": "\u7528\u6237\u53ef\u8054\u7cfb\u4f9b\u5e94\u5546\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttp://www.gnu.org/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-15534",
"openTime": "2017-07-20",
"patchDescription": "glibc\uff08\u53c8\u540dGNU C Library\uff0clibc6\uff09\u662f\u4e00\u79cd\u6309\u7167LGPL\u8bb8\u53ef\u534f\u8bae\u53d1\u5e03\u7684\u5f00\u6e90\u514d\u8d39\u7684C\u8bed\u8a00\u7f16\u8bd1\u7a0b\u5e8f\u3002\r\n\r\nglibc 2.25\u53ca\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "GNU glibc\u672c\u5730\u5185\u5b58\u7834\u574f\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "GNU glibc \u003c=2.2.5"
},
"referenceLink": "http://www.securityfocus.com/bid/99127",
"serverity": "\u9ad8",
"submitTime": "2017-06-20",
"title": "GNU glibc\u672c\u5730\u5185\u5b58\u7834\u574f\u6f0f\u6d1e"
}
RHSA-2017:1480
Vulnerability from csaf_redhat - Published: 2017-06-19 19:36 - Updated: 2025-11-21 18:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for glibc is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.\n\nSecurity Fix(es):\n\n* A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366)\n\nRed Hat would like to thank Qualys Research Labs for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:1480",
"url": "https://access.redhat.com/errata/RHSA-2017:1480"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/stackguard",
"url": "https://access.redhat.com/security/vulnerabilities/stackguard"
},
{
"category": "external",
"summary": "1452543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452543"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1480.json"
}
],
"title": "Red Hat Security Advisory: glibc security update",
"tracking": {
"current_release_date": "2025-11-21T18:00:54+00:00",
"generator": {
"date": "2025-11-21T18:00:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2017:1480",
"initial_release_date": "2017-06-19T19:36:59+00:00",
"revision_history": [
{
"date": "2017-06-19T19:36:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-06-19T19:36:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:00:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"product_id": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.209.el6_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"product": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"product_id": "glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.12-1.209.el6_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"product": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"product_id": "glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.209.el6_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.209.el6_9.2.x86_64",
"product": {
"name": "glibc-0:2.12-1.209.el6_9.2.x86_64",
"product_id": "glibc-0:2.12-1.209.el6_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.209.el6_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"product": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"product_id": "glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.12-1.209.el6_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.12-1.209.el6_9.2.x86_64",
"product": {
"name": "nscd-0:2.12-1.209.el6_9.2.x86_64",
"product_id": "nscd-0:2.12-1.209.el6_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.12-1.209.el6_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"product": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"product_id": "glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.209.el6_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"product": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"product_id": "glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.12-1.209.el6_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"product": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"product_id": "glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.209.el6_9.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"product_id": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.209.el6_9.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.209.el6_9.2.i686",
"product": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.i686",
"product_id": "glibc-devel-0:2.12-1.209.el6_9.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.209.el6_9.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.209.el6_9.2.i686",
"product": {
"name": "glibc-0:2.12-1.209.el6_9.2.i686",
"product_id": "glibc-0:2.12-1.209.el6_9.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.209.el6_9.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"product": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"product_id": "glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.209.el6_9.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.12-1.209.el6_9.2.i686",
"product": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.i686",
"product_id": "glibc-utils-0:2.12-1.209.el6_9.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.12-1.209.el6_9.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.12-1.209.el6_9.2.i686",
"product": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.i686",
"product_id": "glibc-headers-0:2.12-1.209.el6_9.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.12-1.209.el6_9.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.12-1.209.el6_9.2.i686",
"product": {
"name": "nscd-0:2.12-1.209.el6_9.2.i686",
"product_id": "nscd-0:2.12-1.209.el6_9.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.12-1.209.el6_9.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.12-1.209.el6_9.2.i686",
"product": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.i686",
"product_id": "glibc-common-0:2.12-1.209.el6_9.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.12-1.209.el6_9.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.209.el6_9.2.i686",
"product": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.i686",
"product_id": "glibc-static-0:2.12-1.209.el6_9.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.209.el6_9.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-0:2.12-1.209.el6_9.2.src",
"product": {
"name": "glibc-0:2.12-1.209.el6_9.2.src",
"product_id": "glibc-0:2.12-1.209.el6_9.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.209.el6_9.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"product": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"product_id": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.209.el6_9.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"product_id": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.209.el6_9.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc",
"product": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc",
"product_id": "glibc-static-0:2.12-1.209.el6_9.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.209.el6_9.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"product": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"product_id": "glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.209.el6_9.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.209.el6_9.2.ppc",
"product": {
"name": "glibc-0:2.12-1.209.el6_9.2.ppc",
"product_id": "glibc-0:2.12-1.209.el6_9.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.209.el6_9.2?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"product": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"product_id": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.209.el6_9.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"product_id": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.209.el6_9.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"product": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"product_id": "glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.209.el6_9.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"product": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"product_id": "glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.12-1.209.el6_9.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"product": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"product_id": "glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.209.el6_9.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.209.el6_9.2.ppc64",
"product": {
"name": "glibc-0:2.12-1.209.el6_9.2.ppc64",
"product_id": "glibc-0:2.12-1.209.el6_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.209.el6_9.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"product": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"product_id": "glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.12-1.209.el6_9.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.12-1.209.el6_9.2.ppc64",
"product": {
"name": "nscd-0:2.12-1.209.el6_9.2.ppc64",
"product_id": "nscd-0:2.12-1.209.el6_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.12-1.209.el6_9.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"product": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"product_id": "glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.12-1.209.el6_9.2?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"product": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"product_id": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.209.el6_9.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"product_id": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.209.el6_9.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390",
"product": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390",
"product_id": "glibc-static-0:2.12-1.209.el6_9.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.209.el6_9.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390",
"product": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390",
"product_id": "glibc-devel-0:2.12-1.209.el6_9.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.209.el6_9.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.209.el6_9.2.s390",
"product": {
"name": "glibc-0:2.12-1.209.el6_9.2.s390",
"product_id": "glibc-0:2.12-1.209.el6_9.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.209.el6_9.2?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"product": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"product_id": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.209.el6_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"product_id": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.209.el6_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390x",
"product": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390x",
"product_id": "glibc-static-0:2.12-1.209.el6_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.209.el6_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"product": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"product_id": "glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.12-1.209.el6_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"product": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"product_id": "glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.209.el6_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.209.el6_9.2.s390x",
"product": {
"name": "glibc-0:2.12-1.209.el6_9.2.s390x",
"product_id": "glibc-0:2.12-1.209.el6_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.209.el6_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"product": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"product_id": "glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.12-1.209.el6_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.12-1.209.el6_9.2.s390x",
"product": {
"name": "nscd-0:2.12-1.209.el6_9.2.s390x",
"product_id": "nscd-0:2.12-1.209.el6_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.12-1.209.el6_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.12-1.209.el6_9.2.s390x",
"product": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.s390x",
"product_id": "glibc-common-0:2.12-1.209.el6_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.12-1.209.el6_9.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.src"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.src",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.src"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.src",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Client-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.src"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.src",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.src"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.src",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.src"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.src",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.src"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.src",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Server-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.src"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.src",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.src"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.src",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.ppc",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.s390",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.i686",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.s390x",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.209.el6_9.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64"
},
"product_reference": "nscd-0:2.12-1.209.el6_9.2.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.9.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qualys Research Labs"
]
}
],
"cve": "CVE-2017-1000366",
"discovery_date": "2017-05-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1452543"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: heap/stack gap jumping via unbounded stack allocations",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a glibc-side mitigation. For a related kernel mitigation please see https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-1000364 .",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000366"
},
{
"category": "external",
"summary": "RHBZ#1452543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452543"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000366",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000366"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000366",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000366"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/stackguard",
"url": "https://access.redhat.com/security/vulnerabilities/stackguard"
},
{
"category": "external",
"summary": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt",
"url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
}
],
"release_date": "2017-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-19T19:36:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the glibc library must be restarted, or the system rebooted.",
"product_ids": [
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1480"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6Client-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6Client-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6Client-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6Client-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6Client-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6Client-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6Client-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6Client-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6Client-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6Client-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6ComputeNode-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6ComputeNode-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6ComputeNode-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6ComputeNode-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6ComputeNode-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6ComputeNode-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6Server-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6Server-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6Server-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6Server-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6Server-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6Server-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6Server-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6Server-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6Server-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6Server-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6Workstation-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6Workstation-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.src",
"6Workstation-optional-6.9.z:glibc-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-common-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390",
"6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-debuginfo-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390",
"6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-debuginfo-common-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390",
"6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-devel-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-headers-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc",
"6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390",
"6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-static-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:glibc-utils-0:2.12-1.209.el6_9.2.x86_64",
"6Workstation-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.i686",
"6Workstation-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.ppc64",
"6Workstation-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.s390x",
"6Workstation-optional-6.9.z:nscd-0:2.12-1.209.el6_9.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "glibc: heap/stack gap jumping via unbounded stack allocations"
}
]
}
RHSA-2017:1567
Vulnerability from csaf_redhat - Published: 2017-06-21 15:11 - Updated: 2025-11-21 18:01Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Container Development Kit 3.0.0.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Container Development Kit is a platform for developing containerized applications\u2009\u2014\u2009it is a set of tools that enables developers to quickly and easily set up an environment for developing and testing containerized applications on the Red Hat Enterprise Linux platform.\n\nWith this update, Container Development Kit has been updated to 3.0.0-2, which includes an updated Red Hat Enterprise Linux ISO that contains fixes for the following security issues.\n\nSecurity Fix(es):\n\n* A null pointer dereference flaw was found in the way NSS handled empty SSLv2 messages. An attacker could use this flaw to crash a server application compiled against the NSS library. (CVE-2017-7502)\n\n* A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult. (CVE-2017-1000364)\n\n* A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366)\n\nRed Hat would like to thank Qualys Research Labs for reporting CVE-2017-1000364 and CVE-2017-1000366.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:1567",
"url": "https://access.redhat.com/errata/RHSA-2017:1567"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/downloads/content/293/",
"url": "https://access.redhat.com/downloads/content/293/"
},
{
"category": "external",
"summary": "1446631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446631"
},
{
"category": "external",
"summary": "1452543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452543"
},
{
"category": "external",
"summary": "1461333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461333"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1567.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Container Development Kit 3.0.0 security update",
"tracking": {
"current_release_date": "2025-11-21T18:01:03+00:00",
"generator": {
"date": "2025-11-21T18:01:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2017:1567",
"initial_release_date": "2017-06-21T15:11:05+00:00",
"revision_history": [
{
"date": "2017-06-21T15:11:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-06-21T15:11:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:01:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Container Development Kit 3.0",
"product": {
"name": "Red Hat Container Development Kit 3.0",
"product_id": "Red Hat Container Development Kit 3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:container_development_kit:3.0"
}
}
}
],
"category": "product_family",
"name": "Container Development Kit"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-7502",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2017-03-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1446631"
}
],
"notes": [
{
"category": "description",
"text": "A null pointer dereference flaw was found in the way NSS handled empty SSLv2 messages. An attacker could use this flaw to crash a server application compiled against the NSS library.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: Null pointer dereference when handling empty SSLv2 messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Container Development Kit 3.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-7502"
},
{
"category": "external",
"summary": "RHBZ#1446631",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446631"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-7502",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7502"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7502",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7502"
}
],
"release_date": "2017-05-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-21T15:11:05+00:00",
"details": "The References section of this erratum contains a link to download CDK 3.0.0-2 (you must log in to download the update).",
"product_ids": [
"Red Hat Container Development Kit 3.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1567"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat Container Development Kit 3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nss: Null pointer dereference when handling empty SSLv2 messages"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Labs"
]
}
],
"cve": "CVE-2017-1000364",
"discovery_date": "2017-05-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1461333"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap/stack gap jumping via unbounded stack allocations",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a kernel-side mitigation. For a related glibc mitigation please see https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-1000366 .",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Container Development Kit 3.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000364"
},
{
"category": "external",
"summary": "RHBZ#1461333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461333"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000364",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000364"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000364",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000364"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/stackguard",
"url": "https://access.redhat.com/security/vulnerabilities/stackguard"
},
{
"category": "external",
"summary": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt",
"url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
}
],
"release_date": "2017-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-21T15:11:05+00:00",
"details": "The References section of this erratum contains a link to download CDK 3.0.0-2 (you must log in to download the update).",
"product_ids": [
"Red Hat Container Development Kit 3.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1567"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"Red Hat Container Development Kit 3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: heap/stack gap jumping via unbounded stack allocations"
},
{
"acknowledgments": [
{
"names": [
"Qualys Research Labs"
]
}
],
"cve": "CVE-2017-1000366",
"discovery_date": "2017-05-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1452543"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: heap/stack gap jumping via unbounded stack allocations",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a glibc-side mitigation. For a related kernel mitigation please see https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-1000364 .",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Container Development Kit 3.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000366"
},
{
"category": "external",
"summary": "RHBZ#1452543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452543"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000366",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000366"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000366",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000366"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/stackguard",
"url": "https://access.redhat.com/security/vulnerabilities/stackguard"
},
{
"category": "external",
"summary": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt",
"url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
}
],
"release_date": "2017-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-21T15:11:05+00:00",
"details": "The References section of this erratum contains a link to download CDK 3.0.0-2 (you must log in to download the update).",
"product_ids": [
"Red Hat Container Development Kit 3.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1567"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"Red Hat Container Development Kit 3.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "glibc: heap/stack gap jumping via unbounded stack allocations"
}
]
}
RHSA-2017:1481
Vulnerability from csaf_redhat - Published: 2017-06-19 18:49 - Updated: 2025-11-21 18:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for glibc is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.\n\nSecurity Fix(es):\n\n* A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366)\n\nRed Hat would like to thank Qualys Research Labs for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:1481",
"url": "https://access.redhat.com/errata/RHSA-2017:1481"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/stackguard",
"url": "https://access.redhat.com/security/vulnerabilities/stackguard"
},
{
"category": "external",
"summary": "1452543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452543"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1481.json"
}
],
"title": "Red Hat Security Advisory: glibc security update",
"tracking": {
"current_release_date": "2025-11-21T18:00:54+00:00",
"generator": {
"date": "2025-11-21T18:00:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2017:1481",
"initial_release_date": "2017-06-19T18:49:07+00:00",
"revision_history": [
{
"date": "2017-06-19T18:49:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-06-19T18:49:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:00:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-devel-0:2.17-157.el7_3.4.x86_64",
"product": {
"name": "glibc-devel-0:2.17-157.el7_3.4.x86_64",
"product_id": "glibc-devel-0:2.17-157.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.17-157.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.17-157.el7_3.4.x86_64",
"product": {
"name": "nscd-0:2.17-157.el7_3.4.x86_64",
"product_id": "nscd-0:2.17-157.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.17-157.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.17-157.el7_3.4.x86_64",
"product": {
"name": "glibc-common-0:2.17-157.el7_3.4.x86_64",
"product_id": "glibc-common-0:2.17-157.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.17-157.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"product": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"product_id": "glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.17-157.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.17-157.el7_3.4.x86_64",
"product": {
"name": "glibc-utils-0:2.17-157.el7_3.4.x86_64",
"product_id": "glibc-utils-0:2.17-157.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.17-157.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.17-157.el7_3.4.x86_64",
"product": {
"name": "glibc-headers-0:2.17-157.el7_3.4.x86_64",
"product_id": "glibc-headers-0:2.17-157.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.17-157.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.17-157.el7_3.4.x86_64",
"product": {
"name": "glibc-0:2.17-157.el7_3.4.x86_64",
"product_id": "glibc-0:2.17-157.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.17-157.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"product": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"product_id": "glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.17-157.el7_3.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.17-157.el7_3.4.x86_64",
"product": {
"name": "glibc-static-0:2.17-157.el7_3.4.x86_64",
"product_id": "glibc-static-0:2.17-157.el7_3.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.17-157.el7_3.4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-devel-0:2.17-157.el7_3.4.i686",
"product": {
"name": "glibc-devel-0:2.17-157.el7_3.4.i686",
"product_id": "glibc-devel-0:2.17-157.el7_3.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.17-157.el7_3.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"product": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"product_id": "glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.17-157.el7_3.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.17-157.el7_3.4.i686",
"product": {
"name": "glibc-0:2.17-157.el7_3.4.i686",
"product_id": "glibc-0:2.17-157.el7_3.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.17-157.el7_3.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"product": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"product_id": "glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.17-157.el7_3.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.17-157.el7_3.4.i686",
"product": {
"name": "glibc-static-0:2.17-157.el7_3.4.i686",
"product_id": "glibc-static-0:2.17-157.el7_3.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.17-157.el7_3.4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-0:2.17-157.el7_3.4.src",
"product": {
"name": "glibc-0:2.17-157.el7_3.4.src",
"product_id": "glibc-0:2.17-157.el7_3.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.17-157.el7_3.4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc",
"product": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc",
"product_id": "glibc-devel-0:2.17-157.el7_3.4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.17-157.el7_3.4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"product": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"product_id": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.17-157.el7_3.4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.17-157.el7_3.4.ppc",
"product": {
"name": "glibc-0:2.17-157.el7_3.4.ppc",
"product_id": "glibc-0:2.17-157.el7_3.4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.17-157.el7_3.4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"product": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"product_id": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.17-157.el7_3.4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.17-157.el7_3.4.ppc",
"product": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc",
"product_id": "glibc-static-0:2.17-157.el7_3.4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.17-157.el7_3.4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64",
"product": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64",
"product_id": "glibc-devel-0:2.17-157.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.17-157.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.17-157.el7_3.4.ppc64",
"product": {
"name": "nscd-0:2.17-157.el7_3.4.ppc64",
"product_id": "nscd-0:2.17-157.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.17-157.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64",
"product": {
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64",
"product_id": "glibc-common-0:2.17-157.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.17-157.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"product": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"product_id": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.17-157.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64",
"product": {
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64",
"product_id": "glibc-utils-0:2.17-157.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.17-157.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64",
"product": {
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64",
"product_id": "glibc-headers-0:2.17-157.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.17-157.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.17-157.el7_3.4.ppc64",
"product": {
"name": "glibc-0:2.17-157.el7_3.4.ppc64",
"product_id": "glibc-0:2.17-157.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.17-157.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"product": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"product_id": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.17-157.el7_3.4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64",
"product": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64",
"product_id": "glibc-static-0:2.17-157.el7_3.4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.17-157.el7_3.4?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"product": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"product_id": "glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.17-157.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.17-157.el7_3.4.ppc64le",
"product": {
"name": "nscd-0:2.17-157.el7_3.4.ppc64le",
"product_id": "nscd-0:2.17-157.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.17-157.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64le",
"product": {
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64le",
"product_id": "glibc-common-0:2.17-157.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.17-157.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"product": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"product_id": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.17-157.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"product": {
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"product_id": "glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.17-157.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"product": {
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"product_id": "glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.17-157.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.17-157.el7_3.4.ppc64le",
"product": {
"name": "glibc-0:2.17-157.el7_3.4.ppc64le",
"product_id": "glibc-0:2.17-157.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.17-157.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"product": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"product_id": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.17-157.el7_3.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64le",
"product": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64le",
"product_id": "glibc-static-0:2.17-157.el7_3.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.17-157.el7_3.4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-devel-0:2.17-157.el7_3.4.s390",
"product": {
"name": "glibc-devel-0:2.17-157.el7_3.4.s390",
"product_id": "glibc-devel-0:2.17-157.el7_3.4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.17-157.el7_3.4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"product": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"product_id": "glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.17-157.el7_3.4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.17-157.el7_3.4.s390",
"product": {
"name": "glibc-0:2.17-157.el7_3.4.s390",
"product_id": "glibc-0:2.17-157.el7_3.4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.17-157.el7_3.4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"product": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"product_id": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.17-157.el7_3.4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.17-157.el7_3.4.s390",
"product": {
"name": "glibc-static-0:2.17-157.el7_3.4.s390",
"product_id": "glibc-static-0:2.17-157.el7_3.4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.17-157.el7_3.4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-devel-0:2.17-157.el7_3.4.s390x",
"product": {
"name": "glibc-devel-0:2.17-157.el7_3.4.s390x",
"product_id": "glibc-devel-0:2.17-157.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.17-157.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.17-157.el7_3.4.s390x",
"product": {
"name": "nscd-0:2.17-157.el7_3.4.s390x",
"product_id": "nscd-0:2.17-157.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.17-157.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.17-157.el7_3.4.s390x",
"product": {
"name": "glibc-common-0:2.17-157.el7_3.4.s390x",
"product_id": "glibc-common-0:2.17-157.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.17-157.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"product": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"product_id": "glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.17-157.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.17-157.el7_3.4.s390x",
"product": {
"name": "glibc-utils-0:2.17-157.el7_3.4.s390x",
"product_id": "glibc-utils-0:2.17-157.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.17-157.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.17-157.el7_3.4.s390x",
"product": {
"name": "glibc-headers-0:2.17-157.el7_3.4.s390x",
"product_id": "glibc-headers-0:2.17-157.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.17-157.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.17-157.el7_3.4.s390x",
"product": {
"name": "glibc-0:2.17-157.el7_3.4.s390x",
"product_id": "glibc-0:2.17-157.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.17-157.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"product": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"product_id": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.17-157.el7_3.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.17-157.el7_3.4.s390x",
"product": {
"name": "glibc-static-0:2.17-157.el7_3.4.s390x",
"product_id": "glibc-static-0:2.17-157.el7_3.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.17-157.el7_3.4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-devel-0:2.17-157.el7_3.4.aarch64",
"product": {
"name": "glibc-devel-0:2.17-157.el7_3.4.aarch64",
"product_id": "glibc-devel-0:2.17-157.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.17-157.el7_3.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.17-157.el7_3.4.aarch64",
"product": {
"name": "nscd-0:2.17-157.el7_3.4.aarch64",
"product_id": "nscd-0:2.17-157.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.17-157.el7_3.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.17-157.el7_3.4.aarch64",
"product": {
"name": "glibc-common-0:2.17-157.el7_3.4.aarch64",
"product_id": "glibc-common-0:2.17-157.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.17-157.el7_3.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"product": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"product_id": "glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.17-157.el7_3.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.17-157.el7_3.4.aarch64",
"product": {
"name": "glibc-utils-0:2.17-157.el7_3.4.aarch64",
"product_id": "glibc-utils-0:2.17-157.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.17-157.el7_3.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.17-157.el7_3.4.aarch64",
"product": {
"name": "glibc-headers-0:2.17-157.el7_3.4.aarch64",
"product_id": "glibc-headers-0:2.17-157.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.17-157.el7_3.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.17-157.el7_3.4.aarch64",
"product": {
"name": "glibc-0:2.17-157.el7_3.4.aarch64",
"product_id": "glibc-0:2.17-157.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.17-157.el7_3.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.17-157.el7_3.4.aarch64",
"product": {
"name": "glibc-static-0:2.17-157.el7_3.4.aarch64",
"product_id": "glibc-static-0:2.17-157.el7_3.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.17-157.el7_3.4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.src"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.src",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.src"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.src",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Client-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.src"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.src",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.src"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.src",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.src"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.src",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.src"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.src",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.src"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.src",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.src"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.src",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-common-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-devel-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-headers-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.i686",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.s390",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-static-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "glibc-utils-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.aarch64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.s390x",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-157.el7_3.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64"
},
"product_reference": "nscd-0:2.17-157.el7_3.4.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.3.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qualys Research Labs"
]
}
],
"cve": "CVE-2017-1000366",
"discovery_date": "2017-05-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1452543"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: heap/stack gap jumping via unbounded stack allocations",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a glibc-side mitigation. For a related kernel mitigation please see https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-1000364 .",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000366"
},
{
"category": "external",
"summary": "RHBZ#1452543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452543"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000366",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000366"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000366",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000366"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/stackguard",
"url": "https://access.redhat.com/security/vulnerabilities/stackguard"
},
{
"category": "external",
"summary": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt",
"url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
}
],
"release_date": "2017-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-19T18:49:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the glibc library must be restarted, or the system rebooted.",
"product_ids": [
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1481"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7Client-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7Client-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7Client-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7Client-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7ComputeNode-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7ComputeNode-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7ComputeNode-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7Server-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7Server-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7Server-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7Server-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7Workstation-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7Workstation-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.i686",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.src",
"7Workstation-optional-7.3.Z:glibc-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-common-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.i686",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-debuginfo-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.i686",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-debuginfo-common-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.i686",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-devel-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-headers-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.i686",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-static-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:glibc-utils-0:2.17-157.el7_3.4.x86_64",
"7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.aarch64",
"7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64",
"7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.ppc64le",
"7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.s390x",
"7Workstation-optional-7.3.Z:nscd-0:2.17-157.el7_3.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "glibc: heap/stack gap jumping via unbounded stack allocations"
}
]
}
RHSA-2017:1479
Vulnerability from csaf_redhat - Published: 2017-06-19 20:12 - Updated: 2025-11-21 18:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for glibc is now available for Red Hat Enterprise Linux 5 Extended Lifecycle Support, Red Hat Enterprise Linux 5.9 Long Life, Red Hat Enterprise Linux 6.2 Advanced Update Support, Red Hat Enterprise Linux 6.4 Advanced Update Support, Red Hat Enterprise Linux 6.5 Advanced Update Support, Red Hat Enterprise Linux 6.5 Telco Extended Update Support, Red Hat Enterprise Linux 6.6 Advanced Update Support, Red Hat Enterprise Linux 6.6 Telco Extended Update Support, Red Hat Enterprise Linux 6.7 Extended Update Support, and Red Hat Enterprise Linux 7.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.\n\nSecurity Fix(es):\n\n* A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366)\n\nRed Hat would like to thank Qualys Research Labs for reporting this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:1479",
"url": "https://access.redhat.com/errata/RHSA-2017:1479"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/stackguard",
"url": "https://access.redhat.com/security/vulnerabilities/stackguard"
},
{
"category": "external",
"summary": "1452543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452543"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1479.json"
}
],
"title": "Red Hat Security Advisory: glibc security update",
"tracking": {
"current_release_date": "2025-11-21T18:00:54+00:00",
"generator": {
"date": "2025-11-21T18:00:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2017:1479",
"initial_release_date": "2017-06-19T20:12:32+00:00",
"revision_history": [
{
"date": "2017-06-19T20:12:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-06-19T20:12:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:00:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 5 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:5"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product": {
"name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:5.9"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.2::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.2::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.5-123.el5_11.4.x86_64",
"product": {
"name": "glibc-debuginfo-0:2.5-123.el5_11.4.x86_64",
"product_id": "glibc-debuginfo-0:2.5-123.el5_11.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.5-123.el5_11.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.5-123.el5_11.4.x86_64",
"product": {
"name": "nscd-0:2.5-123.el5_11.4.x86_64",
"product_id": "nscd-0:2.5-123.el5_11.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.5-123.el5_11.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.5-123.el5_11.4.x86_64",
"product": {
"name": "glibc-0:2.5-123.el5_11.4.x86_64",
"product_id": "glibc-0:2.5-123.el5_11.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.5-123.el5_11.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.5-123.el5_11.4.x86_64",
"product": {
"name": "glibc-headers-0:2.5-123.el5_11.4.x86_64",
"product_id": "glibc-headers-0:2.5-123.el5_11.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.5-123.el5_11.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.5-123.el5_11.4.x86_64",
"product": {
"name": "glibc-common-0:2.5-123.el5_11.4.x86_64",
"product_id": "glibc-common-0:2.5-123.el5_11.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.5-123.el5_11.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.5-123.el5_11.4.x86_64",
"product": {
"name": "glibc-utils-0:2.5-123.el5_11.4.x86_64",
"product_id": "glibc-utils-0:2.5-123.el5_11.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.5-123.el5_11.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.5-123.el5_11.4.x86_64",
"product": {
"name": "glibc-devel-0:2.5-123.el5_11.4.x86_64",
"product_id": "glibc-devel-0:2.5-123.el5_11.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.5-123.el5_11.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.5-107.el5_9.9.x86_64",
"product": {
"name": "nscd-0:2.5-107.el5_9.9.x86_64",
"product_id": "nscd-0:2.5-107.el5_9.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.5-107.el5_9.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.5-107.el5_9.9.x86_64",
"product": {
"name": "glibc-devel-0:2.5-107.el5_9.9.x86_64",
"product_id": "glibc-devel-0:2.5-107.el5_9.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.5-107.el5_9.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.5-107.el5_9.9.x86_64",
"product": {
"name": "glibc-0:2.5-107.el5_9.9.x86_64",
"product_id": "glibc-0:2.5-107.el5_9.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.5-107.el5_9.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.5-107.el5_9.9.x86_64",
"product": {
"name": "glibc-headers-0:2.5-107.el5_9.9.x86_64",
"product_id": "glibc-headers-0:2.5-107.el5_9.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.5-107.el5_9.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.5-107.el5_9.9.x86_64",
"product": {
"name": "glibc-debuginfo-0:2.5-107.el5_9.9.x86_64",
"product_id": "glibc-debuginfo-0:2.5-107.el5_9.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.5-107.el5_9.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.5-107.el5_9.9.x86_64",
"product": {
"name": "glibc-common-0:2.5-107.el5_9.9.x86_64",
"product_id": "glibc-common-0:2.5-107.el5_9.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.5-107.el5_9.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.5-107.el5_9.9.x86_64",
"product": {
"name": "glibc-utils-0:2.5-107.el5_9.9.x86_64",
"product_id": "glibc-utils-0:2.5-107.el5_9.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.5-107.el5_9.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.47.el6_2.18.x86_64",
"product": {
"name": "glibc-debuginfo-0:2.12-1.47.el6_2.18.x86_64",
"product_id": "glibc-debuginfo-0:2.12-1.47.el6_2.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.47.el6_2.18?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.47.el6_2.18.x86_64",
"product": {
"name": "glibc-static-0:2.12-1.47.el6_2.18.x86_64",
"product_id": "glibc-static-0:2.12-1.47.el6_2.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.47.el6_2.18?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.47.el6_2.18.x86_64",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.47.el6_2.18.x86_64",
"product_id": "glibc-debuginfo-common-0:2.12-1.47.el6_2.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.47.el6_2.18?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.12-1.47.el6_2.18.x86_64",
"product": {
"name": "glibc-utils-0:2.12-1.47.el6_2.18.x86_64",
"product_id": "glibc-utils-0:2.12-1.47.el6_2.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.12-1.47.el6_2.18?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.12-1.47.el6_2.18.x86_64",
"product": {
"name": "glibc-headers-0:2.12-1.47.el6_2.18.x86_64",
"product_id": "glibc-headers-0:2.12-1.47.el6_2.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.12-1.47.el6_2.18?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.12-1.47.el6_2.18.x86_64",
"product": {
"name": "nscd-0:2.12-1.47.el6_2.18.x86_64",
"product_id": "nscd-0:2.12-1.47.el6_2.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.12-1.47.el6_2.18?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.47.el6_2.18.x86_64",
"product": {
"name": "glibc-0:2.12-1.47.el6_2.18.x86_64",
"product_id": "glibc-0:2.12-1.47.el6_2.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.47.el6_2.18?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.12-1.47.el6_2.18.x86_64",
"product": {
"name": "glibc-common-0:2.12-1.47.el6_2.18.x86_64",
"product_id": "glibc-common-0:2.12-1.47.el6_2.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.12-1.47.el6_2.18?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.47.el6_2.18.x86_64",
"product": {
"name": "glibc-devel-0:2.12-1.47.el6_2.18.x86_64",
"product_id": "glibc-devel-0:2.12-1.47.el6_2.18.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.47.el6_2.18?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.107.el6_4.10.x86_64",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.107.el6_4.10.x86_64",
"product_id": "glibc-debuginfo-common-0:2.12-1.107.el6_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.107.el6_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.107.el6_4.10.x86_64",
"product": {
"name": "glibc-static-0:2.12-1.107.el6_4.10.x86_64",
"product_id": "glibc-static-0:2.12-1.107.el6_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.107.el6_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.107.el6_4.10.x86_64",
"product": {
"name": "glibc-debuginfo-0:2.12-1.107.el6_4.10.x86_64",
"product_id": "glibc-debuginfo-0:2.12-1.107.el6_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.107.el6_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.12-1.107.el6_4.10.x86_64",
"product": {
"name": "glibc-headers-0:2.12-1.107.el6_4.10.x86_64",
"product_id": "glibc-headers-0:2.12-1.107.el6_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.12-1.107.el6_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.12-1.107.el6_4.10.x86_64",
"product": {
"name": "nscd-0:2.12-1.107.el6_4.10.x86_64",
"product_id": "nscd-0:2.12-1.107.el6_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.12-1.107.el6_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.107.el6_4.10.x86_64",
"product": {
"name": "glibc-0:2.12-1.107.el6_4.10.x86_64",
"product_id": "glibc-0:2.12-1.107.el6_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.107.el6_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.12-1.107.el6_4.10.x86_64",
"product": {
"name": "glibc-utils-0:2.12-1.107.el6_4.10.x86_64",
"product_id": "glibc-utils-0:2.12-1.107.el6_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.12-1.107.el6_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.107.el6_4.10.x86_64",
"product": {
"name": "glibc-devel-0:2.12-1.107.el6_4.10.x86_64",
"product_id": "glibc-devel-0:2.12-1.107.el6_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.107.el6_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.12-1.107.el6_4.10.x86_64",
"product": {
"name": "glibc-common-0:2.12-1.107.el6_4.10.x86_64",
"product_id": "glibc-common-0:2.12-1.107.el6_4.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.12-1.107.el6_4.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.132.el6_5.9.x86_64",
"product": {
"name": "glibc-static-0:2.12-1.132.el6_5.9.x86_64",
"product_id": "glibc-static-0:2.12-1.132.el6_5.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.132.el6_5.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64",
"product_id": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.132.el6_5.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64",
"product": {
"name": "glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64",
"product_id": "glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.132.el6_5.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.12-1.132.el6_5.9.x86_64",
"product": {
"name": "nscd-0:2.12-1.132.el6_5.9.x86_64",
"product_id": "nscd-0:2.12-1.132.el6_5.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.12-1.132.el6_5.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.132.el6_5.9.x86_64",
"product": {
"name": "glibc-0:2.12-1.132.el6_5.9.x86_64",
"product_id": "glibc-0:2.12-1.132.el6_5.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.132.el6_5.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.12-1.132.el6_5.9.x86_64",
"product": {
"name": "glibc-common-0:2.12-1.132.el6_5.9.x86_64",
"product_id": "glibc-common-0:2.12-1.132.el6_5.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.12-1.132.el6_5.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.12-1.132.el6_5.9.x86_64",
"product": {
"name": "glibc-utils-0:2.12-1.132.el6_5.9.x86_64",
"product_id": "glibc-utils-0:2.12-1.132.el6_5.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.12-1.132.el6_5.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.132.el6_5.9.x86_64",
"product": {
"name": "glibc-devel-0:2.12-1.132.el6_5.9.x86_64",
"product_id": "glibc-devel-0:2.12-1.132.el6_5.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.132.el6_5.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.12-1.132.el6_5.9.x86_64",
"product": {
"name": "glibc-headers-0:2.12-1.132.el6_5.9.x86_64",
"product_id": "glibc-headers-0:2.12-1.132.el6_5.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.12-1.132.el6_5.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64",
"product": {
"name": "glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64",
"product_id": "glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.149.el6_6.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.149.el6_6.12.x86_64",
"product": {
"name": "glibc-static-0:2.12-1.149.el6_6.12.x86_64",
"product_id": "glibc-static-0:2.12-1.149.el6_6.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.149.el6_6.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64",
"product_id": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.149.el6_6.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.12-1.149.el6_6.12.x86_64",
"product": {
"name": "glibc-common-0:2.12-1.149.el6_6.12.x86_64",
"product_id": "glibc-common-0:2.12-1.149.el6_6.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.12-1.149.el6_6.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.149.el6_6.12.x86_64",
"product": {
"name": "glibc-devel-0:2.12-1.149.el6_6.12.x86_64",
"product_id": "glibc-devel-0:2.12-1.149.el6_6.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.149.el6_6.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.12-1.149.el6_6.12.x86_64",
"product": {
"name": "nscd-0:2.12-1.149.el6_6.12.x86_64",
"product_id": "nscd-0:2.12-1.149.el6_6.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.12-1.149.el6_6.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.12-1.149.el6_6.12.x86_64",
"product": {
"name": "glibc-headers-0:2.12-1.149.el6_6.12.x86_64",
"product_id": "glibc-headers-0:2.12-1.149.el6_6.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.12-1.149.el6_6.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.12-1.149.el6_6.12.x86_64",
"product": {
"name": "glibc-utils-0:2.12-1.149.el6_6.12.x86_64",
"product_id": "glibc-utils-0:2.12-1.149.el6_6.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.12-1.149.el6_6.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.149.el6_6.12.x86_64",
"product": {
"name": "glibc-0:2.12-1.149.el6_6.12.x86_64",
"product_id": "glibc-0:2.12-1.149.el6_6.12.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.149.el6_6.12?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.12-1.166.el6_7.8.x86_64",
"product": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.x86_64",
"product_id": "glibc-common-0:2.12-1.166.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.12-1.166.el6_7.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.12-1.166.el6_7.8.x86_64",
"product": {
"name": "nscd-0:2.12-1.166.el6_7.8.x86_64",
"product_id": "nscd-0:2.12-1.166.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.12-1.166.el6_7.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64",
"product": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64",
"product_id": "glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.166.el6_7.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.166.el6_7.8.x86_64",
"product": {
"name": "glibc-0:2.12-1.166.el6_7.8.x86_64",
"product_id": "glibc-0:2.12-1.166.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.166.el6_7.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.166.el6_7.8.x86_64",
"product": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.x86_64",
"product_id": "glibc-devel-0:2.12-1.166.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.166.el6_7.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64",
"product_id": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.166.el6_7.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.12-1.166.el6_7.8.x86_64",
"product": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.x86_64",
"product_id": "glibc-headers-0:2.12-1.166.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.12-1.166.el6_7.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.12-1.166.el6_7.8.x86_64",
"product": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.x86_64",
"product_id": "glibc-utils-0:2.12-1.166.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.12-1.166.el6_7.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.166.el6_7.8.x86_64",
"product": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.x86_64",
"product_id": "glibc-static-0:2.12-1.166.el6_7.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.166.el6_7.8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.17-106.el7_2.9.x86_64",
"product": {
"name": "glibc-0:2.17-106.el7_2.9.x86_64",
"product_id": "glibc-0:2.17-106.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.17-106.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.17-106.el7_2.9.x86_64",
"product": {
"name": "glibc-utils-0:2.17-106.el7_2.9.x86_64",
"product_id": "glibc-utils-0:2.17-106.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.17-106.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64",
"product": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64",
"product_id": "glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.17-106.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.17-106.el7_2.9.x86_64",
"product": {
"name": "nscd-0:2.17-106.el7_2.9.x86_64",
"product_id": "nscd-0:2.17-106.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.17-106.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.17-106.el7_2.9.x86_64",
"product": {
"name": "glibc-headers-0:2.17-106.el7_2.9.x86_64",
"product_id": "glibc-headers-0:2.17-106.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.17-106.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.17-106.el7_2.9.x86_64",
"product": {
"name": "glibc-common-0:2.17-106.el7_2.9.x86_64",
"product_id": "glibc-common-0:2.17-106.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.17-106.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.x86_64",
"product": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.x86_64",
"product_id": "glibc-debuginfo-0:2.17-106.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.17-106.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.17-106.el7_2.9.x86_64",
"product": {
"name": "glibc-devel-0:2.17-106.el7_2.9.x86_64",
"product_id": "glibc-devel-0:2.17-106.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.17-106.el7_2.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.17-106.el7_2.9.x86_64",
"product": {
"name": "glibc-static-0:2.17-106.el7_2.9.x86_64",
"product_id": "glibc-static-0:2.17-106.el7_2.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.17-106.el7_2.9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.5-123.el5_11.4.i386",
"product": {
"name": "glibc-debuginfo-0:2.5-123.el5_11.4.i386",
"product_id": "glibc-debuginfo-0:2.5-123.el5_11.4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.5-123.el5_11.4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.5-123.el5_11.4.i386",
"product": {
"name": "glibc-devel-0:2.5-123.el5_11.4.i386",
"product_id": "glibc-devel-0:2.5-123.el5_11.4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.5-123.el5_11.4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.5-123.el5_11.4.i386",
"product": {
"name": "glibc-debuginfo-common-0:2.5-123.el5_11.4.i386",
"product_id": "glibc-debuginfo-common-0:2.5-123.el5_11.4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.5-123.el5_11.4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.5-123.el5_11.4.i386",
"product": {
"name": "nscd-0:2.5-123.el5_11.4.i386",
"product_id": "nscd-0:2.5-123.el5_11.4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.5-123.el5_11.4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.5-123.el5_11.4.i386",
"product": {
"name": "glibc-0:2.5-123.el5_11.4.i386",
"product_id": "glibc-0:2.5-123.el5_11.4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.5-123.el5_11.4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.5-123.el5_11.4.i386",
"product": {
"name": "glibc-headers-0:2.5-123.el5_11.4.i386",
"product_id": "glibc-headers-0:2.5-123.el5_11.4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.5-123.el5_11.4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.5-123.el5_11.4.i386",
"product": {
"name": "glibc-common-0:2.5-123.el5_11.4.i386",
"product_id": "glibc-common-0:2.5-123.el5_11.4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.5-123.el5_11.4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.5-123.el5_11.4.i386",
"product": {
"name": "glibc-utils-0:2.5-123.el5_11.4.i386",
"product_id": "glibc-utils-0:2.5-123.el5_11.4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.5-123.el5_11.4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.5-107.el5_9.9.i386",
"product": {
"name": "glibc-devel-0:2.5-107.el5_9.9.i386",
"product_id": "glibc-devel-0:2.5-107.el5_9.9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.5-107.el5_9.9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.5-107.el5_9.9.i386",
"product": {
"name": "glibc-debuginfo-common-0:2.5-107.el5_9.9.i386",
"product_id": "glibc-debuginfo-common-0:2.5-107.el5_9.9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.5-107.el5_9.9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.5-107.el5_9.9.i386",
"product": {
"name": "glibc-debuginfo-0:2.5-107.el5_9.9.i386",
"product_id": "glibc-debuginfo-0:2.5-107.el5_9.9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.5-107.el5_9.9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.5-107.el5_9.9.i386",
"product": {
"name": "nscd-0:2.5-107.el5_9.9.i386",
"product_id": "nscd-0:2.5-107.el5_9.9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.5-107.el5_9.9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.5-107.el5_9.9.i386",
"product": {
"name": "glibc-0:2.5-107.el5_9.9.i386",
"product_id": "glibc-0:2.5-107.el5_9.9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.5-107.el5_9.9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.5-107.el5_9.9.i386",
"product": {
"name": "glibc-headers-0:2.5-107.el5_9.9.i386",
"product_id": "glibc-headers-0:2.5-107.el5_9.9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.5-107.el5_9.9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.5-107.el5_9.9.i386",
"product": {
"name": "glibc-common-0:2.5-107.el5_9.9.i386",
"product_id": "glibc-common-0:2.5-107.el5_9.9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.5-107.el5_9.9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.5-107.el5_9.9.i386",
"product": {
"name": "glibc-utils-0:2.5-107.el5_9.9.i386",
"product_id": "glibc-utils-0:2.5-107.el5_9.9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.5-107.el5_9.9?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.5-123.el5_11.4.i686",
"product": {
"name": "glibc-debuginfo-0:2.5-123.el5_11.4.i686",
"product_id": "glibc-debuginfo-0:2.5-123.el5_11.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.5-123.el5_11.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.5-123.el5_11.4.i686",
"product": {
"name": "glibc-0:2.5-123.el5_11.4.i686",
"product_id": "glibc-0:2.5-123.el5_11.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.5-123.el5_11.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.5-107.el5_9.9.i686",
"product": {
"name": "glibc-0:2.5-107.el5_9.9.i686",
"product_id": "glibc-0:2.5-107.el5_9.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.5-107.el5_9.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.5-107.el5_9.9.i686",
"product": {
"name": "glibc-debuginfo-0:2.5-107.el5_9.9.i686",
"product_id": "glibc-debuginfo-0:2.5-107.el5_9.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.5-107.el5_9.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.47.el6_2.18.i686",
"product": {
"name": "glibc-debuginfo-0:2.12-1.47.el6_2.18.i686",
"product_id": "glibc-debuginfo-0:2.12-1.47.el6_2.18.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.47.el6_2.18?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.47.el6_2.18.i686",
"product": {
"name": "glibc-static-0:2.12-1.47.el6_2.18.i686",
"product_id": "glibc-static-0:2.12-1.47.el6_2.18.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.47.el6_2.18?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.47.el6_2.18.i686",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.47.el6_2.18.i686",
"product_id": "glibc-debuginfo-common-0:2.12-1.47.el6_2.18.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.47.el6_2.18?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.47.el6_2.18.i686",
"product": {
"name": "glibc-0:2.12-1.47.el6_2.18.i686",
"product_id": "glibc-0:2.12-1.47.el6_2.18.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.47.el6_2.18?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.47.el6_2.18.i686",
"product": {
"name": "glibc-devel-0:2.12-1.47.el6_2.18.i686",
"product_id": "glibc-devel-0:2.12-1.47.el6_2.18.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.47.el6_2.18?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.107.el6_4.10.i686",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.107.el6_4.10.i686",
"product_id": "glibc-debuginfo-common-0:2.12-1.107.el6_4.10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.107.el6_4.10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.107.el6_4.10.i686",
"product": {
"name": "glibc-static-0:2.12-1.107.el6_4.10.i686",
"product_id": "glibc-static-0:2.12-1.107.el6_4.10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.107.el6_4.10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.107.el6_4.10.i686",
"product": {
"name": "glibc-debuginfo-0:2.12-1.107.el6_4.10.i686",
"product_id": "glibc-debuginfo-0:2.12-1.107.el6_4.10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.107.el6_4.10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.107.el6_4.10.i686",
"product": {
"name": "glibc-0:2.12-1.107.el6_4.10.i686",
"product_id": "glibc-0:2.12-1.107.el6_4.10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.107.el6_4.10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.107.el6_4.10.i686",
"product": {
"name": "glibc-devel-0:2.12-1.107.el6_4.10.i686",
"product_id": "glibc-devel-0:2.12-1.107.el6_4.10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.107.el6_4.10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.132.el6_5.9.i686",
"product": {
"name": "glibc-static-0:2.12-1.132.el6_5.9.i686",
"product_id": "glibc-static-0:2.12-1.132.el6_5.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.132.el6_5.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686",
"product_id": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.132.el6_5.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.132.el6_5.9.i686",
"product": {
"name": "glibc-debuginfo-0:2.12-1.132.el6_5.9.i686",
"product_id": "glibc-debuginfo-0:2.12-1.132.el6_5.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.132.el6_5.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.132.el6_5.9.i686",
"product": {
"name": "glibc-0:2.12-1.132.el6_5.9.i686",
"product_id": "glibc-0:2.12-1.132.el6_5.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.132.el6_5.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.132.el6_5.9.i686",
"product": {
"name": "glibc-devel-0:2.12-1.132.el6_5.9.i686",
"product_id": "glibc-devel-0:2.12-1.132.el6_5.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.132.el6_5.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.149.el6_6.12.i686",
"product": {
"name": "glibc-debuginfo-0:2.12-1.149.el6_6.12.i686",
"product_id": "glibc-debuginfo-0:2.12-1.149.el6_6.12.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.149.el6_6.12?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.149.el6_6.12.i686",
"product": {
"name": "glibc-static-0:2.12-1.149.el6_6.12.i686",
"product_id": "glibc-static-0:2.12-1.149.el6_6.12.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.149.el6_6.12?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686",
"product_id": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.149.el6_6.12?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.149.el6_6.12.i686",
"product": {
"name": "glibc-devel-0:2.12-1.149.el6_6.12.i686",
"product_id": "glibc-devel-0:2.12-1.149.el6_6.12.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.149.el6_6.12?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.149.el6_6.12.i686",
"product": {
"name": "glibc-0:2.12-1.149.el6_6.12.i686",
"product_id": "glibc-0:2.12-1.149.el6_6.12.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.149.el6_6.12?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.i686",
"product": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.i686",
"product_id": "glibc-debuginfo-0:2.12-1.166.el6_7.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.166.el6_7.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.166.el6_7.8.i686",
"product": {
"name": "glibc-0:2.12-1.166.el6_7.8.i686",
"product_id": "glibc-0:2.12-1.166.el6_7.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.166.el6_7.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.166.el6_7.8.i686",
"product": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.i686",
"product_id": "glibc-devel-0:2.12-1.166.el6_7.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.166.el6_7.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686",
"product_id": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.166.el6_7.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.166.el6_7.8.i686",
"product": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.i686",
"product_id": "glibc-static-0:2.12-1.166.el6_7.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.166.el6_7.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.12-1.166.el6_7.8.i686",
"product": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.i686",
"product_id": "glibc-common-0:2.12-1.166.el6_7.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.12-1.166.el6_7.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.12-1.166.el6_7.8.i686",
"product": {
"name": "nscd-0:2.12-1.166.el6_7.8.i686",
"product_id": "nscd-0:2.12-1.166.el6_7.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.12-1.166.el6_7.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.12-1.166.el6_7.8.i686",
"product": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.i686",
"product_id": "glibc-headers-0:2.12-1.166.el6_7.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.12-1.166.el6_7.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.12-1.166.el6_7.8.i686",
"product": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.i686",
"product_id": "glibc-utils-0:2.12-1.166.el6_7.8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.12-1.166.el6_7.8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.17-106.el7_2.9.i686",
"product": {
"name": "glibc-0:2.17-106.el7_2.9.i686",
"product_id": "glibc-0:2.17-106.el7_2.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.17-106.el7_2.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.i686",
"product": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.i686",
"product_id": "glibc-debuginfo-common-0:2.17-106.el7_2.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.17-106.el7_2.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.i686",
"product": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.i686",
"product_id": "glibc-debuginfo-0:2.17-106.el7_2.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.17-106.el7_2.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.17-106.el7_2.9.i686",
"product": {
"name": "glibc-devel-0:2.17-106.el7_2.9.i686",
"product_id": "glibc-devel-0:2.17-106.el7_2.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.17-106.el7_2.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.17-106.el7_2.9.i686",
"product": {
"name": "glibc-static-0:2.17-106.el7_2.9.i686",
"product_id": "glibc-static-0:2.17-106.el7_2.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.17-106.el7_2.9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.5-123.el5_11.4.s390x",
"product": {
"name": "glibc-debuginfo-0:2.5-123.el5_11.4.s390x",
"product_id": "glibc-debuginfo-0:2.5-123.el5_11.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.5-123.el5_11.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.5-123.el5_11.4.s390x",
"product": {
"name": "nscd-0:2.5-123.el5_11.4.s390x",
"product_id": "nscd-0:2.5-123.el5_11.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.5-123.el5_11.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.5-123.el5_11.4.s390x",
"product": {
"name": "glibc-0:2.5-123.el5_11.4.s390x",
"product_id": "glibc-0:2.5-123.el5_11.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.5-123.el5_11.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.5-123.el5_11.4.s390x",
"product": {
"name": "glibc-headers-0:2.5-123.el5_11.4.s390x",
"product_id": "glibc-headers-0:2.5-123.el5_11.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.5-123.el5_11.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.5-123.el5_11.4.s390x",
"product": {
"name": "glibc-common-0:2.5-123.el5_11.4.s390x",
"product_id": "glibc-common-0:2.5-123.el5_11.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.5-123.el5_11.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.5-123.el5_11.4.s390x",
"product": {
"name": "glibc-utils-0:2.5-123.el5_11.4.s390x",
"product_id": "glibc-utils-0:2.5-123.el5_11.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.5-123.el5_11.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.5-123.el5_11.4.s390x",
"product": {
"name": "glibc-devel-0:2.5-123.el5_11.4.s390x",
"product_id": "glibc-devel-0:2.5-123.el5_11.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.5-123.el5_11.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x",
"product": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x",
"product_id": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.166.el6_7.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x",
"product_id": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.166.el6_7.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.166.el6_7.8.s390x",
"product": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.s390x",
"product_id": "glibc-static-0:2.12-1.166.el6_7.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.166.el6_7.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.12-1.166.el6_7.8.s390x",
"product": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.s390x",
"product_id": "glibc-common-0:2.12-1.166.el6_7.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.12-1.166.el6_7.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.12-1.166.el6_7.8.s390x",
"product": {
"name": "nscd-0:2.12-1.166.el6_7.8.s390x",
"product_id": "nscd-0:2.12-1.166.el6_7.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.12-1.166.el6_7.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.166.el6_7.8.s390x",
"product": {
"name": "glibc-0:2.12-1.166.el6_7.8.s390x",
"product_id": "glibc-0:2.12-1.166.el6_7.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.166.el6_7.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.166.el6_7.8.s390x",
"product": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.s390x",
"product_id": "glibc-devel-0:2.12-1.166.el6_7.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.166.el6_7.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.12-1.166.el6_7.8.s390x",
"product": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.s390x",
"product_id": "glibc-headers-0:2.12-1.166.el6_7.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.12-1.166.el6_7.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.12-1.166.el6_7.8.s390x",
"product": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.s390x",
"product_id": "glibc-utils-0:2.12-1.166.el6_7.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.12-1.166.el6_7.8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.s390x",
"product": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.s390x",
"product_id": "glibc-debuginfo-0:2.17-106.el7_2.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.17-106.el7_2.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x",
"product": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x",
"product_id": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.17-106.el7_2.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.17-106.el7_2.9.s390x",
"product": {
"name": "glibc-static-0:2.17-106.el7_2.9.s390x",
"product_id": "glibc-static-0:2.17-106.el7_2.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.17-106.el7_2.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.17-106.el7_2.9.s390x",
"product": {
"name": "glibc-0:2.17-106.el7_2.9.s390x",
"product_id": "glibc-0:2.17-106.el7_2.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.17-106.el7_2.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.17-106.el7_2.9.s390x",
"product": {
"name": "glibc-utils-0:2.17-106.el7_2.9.s390x",
"product_id": "glibc-utils-0:2.17-106.el7_2.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.17-106.el7_2.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.17-106.el7_2.9.s390x",
"product": {
"name": "nscd-0:2.17-106.el7_2.9.s390x",
"product_id": "nscd-0:2.17-106.el7_2.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.17-106.el7_2.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.17-106.el7_2.9.s390x",
"product": {
"name": "glibc-headers-0:2.17-106.el7_2.9.s390x",
"product_id": "glibc-headers-0:2.17-106.el7_2.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.17-106.el7_2.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.17-106.el7_2.9.s390x",
"product": {
"name": "glibc-common-0:2.17-106.el7_2.9.s390x",
"product_id": "glibc-common-0:2.17-106.el7_2.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.17-106.el7_2.9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.17-106.el7_2.9.s390x",
"product": {
"name": "glibc-devel-0:2.17-106.el7_2.9.s390x",
"product_id": "glibc-devel-0:2.17-106.el7_2.9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.17-106.el7_2.9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.5-123.el5_11.4.s390",
"product": {
"name": "glibc-debuginfo-0:2.5-123.el5_11.4.s390",
"product_id": "glibc-debuginfo-0:2.5-123.el5_11.4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.5-123.el5_11.4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.5-123.el5_11.4.s390",
"product": {
"name": "glibc-0:2.5-123.el5_11.4.s390",
"product_id": "glibc-0:2.5-123.el5_11.4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.5-123.el5_11.4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.5-123.el5_11.4.s390",
"product": {
"name": "glibc-devel-0:2.5-123.el5_11.4.s390",
"product_id": "glibc-devel-0:2.5-123.el5_11.4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.5-123.el5_11.4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390",
"product": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390",
"product_id": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.166.el6_7.8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390",
"product_id": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.166.el6_7.8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.166.el6_7.8.s390",
"product": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.s390",
"product_id": "glibc-static-0:2.12-1.166.el6_7.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.166.el6_7.8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.166.el6_7.8.s390",
"product": {
"name": "glibc-0:2.12-1.166.el6_7.8.s390",
"product_id": "glibc-0:2.12-1.166.el6_7.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.166.el6_7.8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.166.el6_7.8.s390",
"product": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.s390",
"product_id": "glibc-devel-0:2.12-1.166.el6_7.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.166.el6_7.8?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.s390",
"product": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.s390",
"product_id": "glibc-debuginfo-0:2.17-106.el7_2.9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.17-106.el7_2.9?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390",
"product": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390",
"product_id": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.17-106.el7_2.9?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.17-106.el7_2.9.s390",
"product": {
"name": "glibc-static-0:2.17-106.el7_2.9.s390",
"product_id": "glibc-static-0:2.17-106.el7_2.9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.17-106.el7_2.9?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.17-106.el7_2.9.s390",
"product": {
"name": "glibc-0:2.17-106.el7_2.9.s390",
"product_id": "glibc-0:2.17-106.el7_2.9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.17-106.el7_2.9?arch=s390"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.17-106.el7_2.9.s390",
"product": {
"name": "glibc-devel-0:2.17-106.el7_2.9.s390",
"product_id": "glibc-devel-0:2.17-106.el7_2.9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.17-106.el7_2.9?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-0:2.5-123.el5_11.4.src",
"product": {
"name": "glibc-0:2.5-123.el5_11.4.src",
"product_id": "glibc-0:2.5-123.el5_11.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.5-123.el5_11.4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.5-107.el5_9.9.src",
"product": {
"name": "glibc-0:2.5-107.el5_9.9.src",
"product_id": "glibc-0:2.5-107.el5_9.9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.5-107.el5_9.9?arch=src"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.47.el6_2.18.src",
"product": {
"name": "glibc-0:2.12-1.47.el6_2.18.src",
"product_id": "glibc-0:2.12-1.47.el6_2.18.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.47.el6_2.18?arch=src"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.107.el6_4.10.src",
"product": {
"name": "glibc-0:2.12-1.107.el6_4.10.src",
"product_id": "glibc-0:2.12-1.107.el6_4.10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.107.el6_4.10?arch=src"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.132.el6_5.9.src",
"product": {
"name": "glibc-0:2.12-1.132.el6_5.9.src",
"product_id": "glibc-0:2.12-1.132.el6_5.9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.132.el6_5.9?arch=src"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.149.el6_6.12.src",
"product": {
"name": "glibc-0:2.12-1.149.el6_6.12.src",
"product_id": "glibc-0:2.12-1.149.el6_6.12.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.149.el6_6.12?arch=src"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.166.el6_7.8.src",
"product": {
"name": "glibc-0:2.12-1.166.el6_7.8.src",
"product_id": "glibc-0:2.12-1.166.el6_7.8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.166.el6_7.8?arch=src"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.17-106.el7_2.9.src",
"product": {
"name": "glibc-0:2.17-106.el7_2.9.src",
"product_id": "glibc-0:2.17-106.el7_2.9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.17-106.el7_2.9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc",
"product": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc",
"product_id": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.166.el6_7.8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc",
"product_id": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.166.el6_7.8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.166.el6_7.8.ppc",
"product": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.ppc",
"product_id": "glibc-static-0:2.12-1.166.el6_7.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.166.el6_7.8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.166.el6_7.8.ppc",
"product": {
"name": "glibc-0:2.12-1.166.el6_7.8.ppc",
"product_id": "glibc-0:2.12-1.166.el6_7.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.166.el6_7.8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.166.el6_7.8.ppc",
"product": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.ppc",
"product_id": "glibc-devel-0:2.12-1.166.el6_7.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.166.el6_7.8?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc",
"product": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc",
"product_id": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.17-106.el7_2.9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc",
"product": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc",
"product_id": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.17-106.el7_2.9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.17-106.el7_2.9.ppc",
"product": {
"name": "glibc-static-0:2.17-106.el7_2.9.ppc",
"product_id": "glibc-static-0:2.17-106.el7_2.9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.17-106.el7_2.9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.17-106.el7_2.9.ppc",
"product": {
"name": "glibc-0:2.17-106.el7_2.9.ppc",
"product_id": "glibc-0:2.17-106.el7_2.9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.17-106.el7_2.9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.17-106.el7_2.9.ppc",
"product": {
"name": "glibc-devel-0:2.17-106.el7_2.9.ppc",
"product_id": "glibc-devel-0:2.17-106.el7_2.9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.17-106.el7_2.9?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64",
"product": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64",
"product_id": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.12-1.166.el6_7.8?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64",
"product": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64",
"product_id": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.12-1.166.el6_7.8?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.12-1.166.el6_7.8.ppc64",
"product": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.ppc64",
"product_id": "glibc-static-0:2.12-1.166.el6_7.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.12-1.166.el6_7.8?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.12-1.166.el6_7.8.ppc64",
"product": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.ppc64",
"product_id": "glibc-common-0:2.12-1.166.el6_7.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.12-1.166.el6_7.8?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.12-1.166.el6_7.8.ppc64",
"product": {
"name": "nscd-0:2.12-1.166.el6_7.8.ppc64",
"product_id": "nscd-0:2.12-1.166.el6_7.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.12-1.166.el6_7.8?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.12-1.166.el6_7.8.ppc64",
"product": {
"name": "glibc-0:2.12-1.166.el6_7.8.ppc64",
"product_id": "glibc-0:2.12-1.166.el6_7.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.12-1.166.el6_7.8?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.12-1.166.el6_7.8.ppc64",
"product": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.ppc64",
"product_id": "glibc-devel-0:2.12-1.166.el6_7.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.12-1.166.el6_7.8?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.12-1.166.el6_7.8.ppc64",
"product": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.ppc64",
"product_id": "glibc-headers-0:2.12-1.166.el6_7.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.12-1.166.el6_7.8?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.12-1.166.el6_7.8.ppc64",
"product": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.ppc64",
"product_id": "glibc-utils-0:2.12-1.166.el6_7.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.12-1.166.el6_7.8?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64",
"product": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64",
"product_id": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.17-106.el7_2.9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64",
"product": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64",
"product_id": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.17-106.el7_2.9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.17-106.el7_2.9.ppc64",
"product": {
"name": "glibc-static-0:2.17-106.el7_2.9.ppc64",
"product_id": "glibc-static-0:2.17-106.el7_2.9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.17-106.el7_2.9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.17-106.el7_2.9.ppc64",
"product": {
"name": "glibc-0:2.17-106.el7_2.9.ppc64",
"product_id": "glibc-0:2.17-106.el7_2.9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.17-106.el7_2.9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.17-106.el7_2.9.ppc64",
"product": {
"name": "glibc-utils-0:2.17-106.el7_2.9.ppc64",
"product_id": "glibc-utils-0:2.17-106.el7_2.9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.17-106.el7_2.9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.17-106.el7_2.9.ppc64",
"product": {
"name": "nscd-0:2.17-106.el7_2.9.ppc64",
"product_id": "nscd-0:2.17-106.el7_2.9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.17-106.el7_2.9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.17-106.el7_2.9.ppc64",
"product": {
"name": "glibc-headers-0:2.17-106.el7_2.9.ppc64",
"product_id": "glibc-headers-0:2.17-106.el7_2.9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.17-106.el7_2.9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.17-106.el7_2.9.ppc64",
"product": {
"name": "glibc-common-0:2.17-106.el7_2.9.ppc64",
"product_id": "glibc-common-0:2.17-106.el7_2.9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.17-106.el7_2.9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.17-106.el7_2.9.ppc64",
"product": {
"name": "glibc-devel-0:2.17-106.el7_2.9.ppc64",
"product_id": "glibc-devel-0:2.17-106.el7_2.9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.17-106.el7_2.9?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le",
"product": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le",
"product_id": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo@2.17-106.el7_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le",
"product": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le",
"product_id": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-debuginfo-common@2.17-106.el7_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glibc-static-0:2.17-106.el7_2.9.ppc64le",
"product": {
"name": "glibc-static-0:2.17-106.el7_2.9.ppc64le",
"product_id": "glibc-static-0:2.17-106.el7_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-static@2.17-106.el7_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glibc-0:2.17-106.el7_2.9.ppc64le",
"product": {
"name": "glibc-0:2.17-106.el7_2.9.ppc64le",
"product_id": "glibc-0:2.17-106.el7_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc@2.17-106.el7_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glibc-utils-0:2.17-106.el7_2.9.ppc64le",
"product": {
"name": "glibc-utils-0:2.17-106.el7_2.9.ppc64le",
"product_id": "glibc-utils-0:2.17-106.el7_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-utils@2.17-106.el7_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "nscd-0:2.17-106.el7_2.9.ppc64le",
"product": {
"name": "nscd-0:2.17-106.el7_2.9.ppc64le",
"product_id": "nscd-0:2.17-106.el7_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/nscd@2.17-106.el7_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glibc-headers-0:2.17-106.el7_2.9.ppc64le",
"product": {
"name": "glibc-headers-0:2.17-106.el7_2.9.ppc64le",
"product_id": "glibc-headers-0:2.17-106.el7_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-headers@2.17-106.el7_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glibc-common-0:2.17-106.el7_2.9.ppc64le",
"product": {
"name": "glibc-common-0:2.17-106.el7_2.9.ppc64le",
"product_id": "glibc-common-0:2.17-106.el7_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-common@2.17-106.el7_2.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "glibc-devel-0:2.17-106.el7_2.9.ppc64le",
"product": {
"name": "glibc-devel-0:2.17-106.el7_2.9.ppc64le",
"product_id": "glibc-devel-0:2.17-106.el7_2.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glibc-devel@2.17-106.el7_2.9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.5-107.el5_9.9.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:glibc-0:2.5-107.el5_9.9.i386"
},
"product_reference": "glibc-0:2.5-107.el5_9.9.i386",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.5-107.el5_9.9.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:glibc-0:2.5-107.el5_9.9.i686"
},
"product_reference": "glibc-0:2.5-107.el5_9.9.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.5-107.el5_9.9.src as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:glibc-0:2.5-107.el5_9.9.src"
},
"product_reference": "glibc-0:2.5-107.el5_9.9.src",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.5-107.el5_9.9.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:glibc-0:2.5-107.el5_9.9.x86_64"
},
"product_reference": "glibc-0:2.5-107.el5_9.9.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.5-107.el5_9.9.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:glibc-common-0:2.5-107.el5_9.9.i386"
},
"product_reference": "glibc-common-0:2.5-107.el5_9.9.i386",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.5-107.el5_9.9.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:glibc-common-0:2.5-107.el5_9.9.x86_64"
},
"product_reference": "glibc-common-0:2.5-107.el5_9.9.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.5-107.el5_9.9.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:glibc-debuginfo-0:2.5-107.el5_9.9.i386"
},
"product_reference": "glibc-debuginfo-0:2.5-107.el5_9.9.i386",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.5-107.el5_9.9.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:glibc-debuginfo-0:2.5-107.el5_9.9.i686"
},
"product_reference": "glibc-debuginfo-0:2.5-107.el5_9.9.i686",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.5-107.el5_9.9.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:glibc-debuginfo-0:2.5-107.el5_9.9.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.5-107.el5_9.9.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.5-107.el5_9.9.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:glibc-debuginfo-common-0:2.5-107.el5_9.9.i386"
},
"product_reference": "glibc-debuginfo-common-0:2.5-107.el5_9.9.i386",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.5-107.el5_9.9.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:glibc-devel-0:2.5-107.el5_9.9.i386"
},
"product_reference": "glibc-devel-0:2.5-107.el5_9.9.i386",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.5-107.el5_9.9.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:glibc-devel-0:2.5-107.el5_9.9.x86_64"
},
"product_reference": "glibc-devel-0:2.5-107.el5_9.9.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.5-107.el5_9.9.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:glibc-headers-0:2.5-107.el5_9.9.i386"
},
"product_reference": "glibc-headers-0:2.5-107.el5_9.9.i386",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.5-107.el5_9.9.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:glibc-headers-0:2.5-107.el5_9.9.x86_64"
},
"product_reference": "glibc-headers-0:2.5-107.el5_9.9.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.5-107.el5_9.9.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:glibc-utils-0:2.5-107.el5_9.9.i386"
},
"product_reference": "glibc-utils-0:2.5-107.el5_9.9.i386",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.5-107.el5_9.9.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:glibc-utils-0:2.5-107.el5_9.9.x86_64"
},
"product_reference": "glibc-utils-0:2.5-107.el5_9.9.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.5-107.el5_9.9.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:nscd-0:2.5-107.el5_9.9.i386"
},
"product_reference": "nscd-0:2.5-107.el5_9.9.i386",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.5-107.el5_9.9.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)",
"product_id": "5Server-5.9.AUS:nscd-0:2.5-107.el5_9.9.x86_64"
},
"product_reference": "nscd-0:2.5-107.el5_9.9.x86_64",
"relates_to_product_reference": "5Server-5.9.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.5-123.el5_11.4.i386 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-0:2.5-123.el5_11.4.i386"
},
"product_reference": "glibc-0:2.5-123.el5_11.4.i386",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.5-123.el5_11.4.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-0:2.5-123.el5_11.4.i686"
},
"product_reference": "glibc-0:2.5-123.el5_11.4.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.5-123.el5_11.4.s390 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-0:2.5-123.el5_11.4.s390"
},
"product_reference": "glibc-0:2.5-123.el5_11.4.s390",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.5-123.el5_11.4.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-0:2.5-123.el5_11.4.s390x"
},
"product_reference": "glibc-0:2.5-123.el5_11.4.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.5-123.el5_11.4.src as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-0:2.5-123.el5_11.4.src"
},
"product_reference": "glibc-0:2.5-123.el5_11.4.src",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.5-123.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-0:2.5-123.el5_11.4.x86_64"
},
"product_reference": "glibc-0:2.5-123.el5_11.4.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.5-123.el5_11.4.i386 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-common-0:2.5-123.el5_11.4.i386"
},
"product_reference": "glibc-common-0:2.5-123.el5_11.4.i386",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.5-123.el5_11.4.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-common-0:2.5-123.el5_11.4.s390x"
},
"product_reference": "glibc-common-0:2.5-123.el5_11.4.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.5-123.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-common-0:2.5-123.el5_11.4.x86_64"
},
"product_reference": "glibc-common-0:2.5-123.el5_11.4.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.5-123.el5_11.4.i386 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.i386"
},
"product_reference": "glibc-debuginfo-0:2.5-123.el5_11.4.i386",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.5-123.el5_11.4.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.i686"
},
"product_reference": "glibc-debuginfo-0:2.5-123.el5_11.4.i686",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.5-123.el5_11.4.s390 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.s390"
},
"product_reference": "glibc-debuginfo-0:2.5-123.el5_11.4.s390",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.5-123.el5_11.4.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.s390x"
},
"product_reference": "glibc-debuginfo-0:2.5-123.el5_11.4.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.5-123.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.5-123.el5_11.4.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.5-123.el5_11.4.i386 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-debuginfo-common-0:2.5-123.el5_11.4.i386"
},
"product_reference": "glibc-debuginfo-common-0:2.5-123.el5_11.4.i386",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.5-123.el5_11.4.i386 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-devel-0:2.5-123.el5_11.4.i386"
},
"product_reference": "glibc-devel-0:2.5-123.el5_11.4.i386",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.5-123.el5_11.4.s390 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-devel-0:2.5-123.el5_11.4.s390"
},
"product_reference": "glibc-devel-0:2.5-123.el5_11.4.s390",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.5-123.el5_11.4.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-devel-0:2.5-123.el5_11.4.s390x"
},
"product_reference": "glibc-devel-0:2.5-123.el5_11.4.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.5-123.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-devel-0:2.5-123.el5_11.4.x86_64"
},
"product_reference": "glibc-devel-0:2.5-123.el5_11.4.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.5-123.el5_11.4.i386 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-headers-0:2.5-123.el5_11.4.i386"
},
"product_reference": "glibc-headers-0:2.5-123.el5_11.4.i386",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.5-123.el5_11.4.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-headers-0:2.5-123.el5_11.4.s390x"
},
"product_reference": "glibc-headers-0:2.5-123.el5_11.4.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.5-123.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-headers-0:2.5-123.el5_11.4.x86_64"
},
"product_reference": "glibc-headers-0:2.5-123.el5_11.4.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.5-123.el5_11.4.i386 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-utils-0:2.5-123.el5_11.4.i386"
},
"product_reference": "glibc-utils-0:2.5-123.el5_11.4.i386",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.5-123.el5_11.4.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-utils-0:2.5-123.el5_11.4.s390x"
},
"product_reference": "glibc-utils-0:2.5-123.el5_11.4.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.5-123.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:glibc-utils-0:2.5-123.el5_11.4.x86_64"
},
"product_reference": "glibc-utils-0:2.5-123.el5_11.4.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.5-123.el5_11.4.i386 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:nscd-0:2.5-123.el5_11.4.i386"
},
"product_reference": "nscd-0:2.5-123.el5_11.4.i386",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.5-123.el5_11.4.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:nscd-0:2.5-123.el5_11.4.s390x"
},
"product_reference": "nscd-0:2.5-123.el5_11.4.s390x",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.5-123.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)",
"product_id": "5Server-ELS:nscd-0:2.5-123.el5_11.4.x86_64"
},
"product_reference": "nscd-0:2.5-123.el5_11.4.x86_64",
"relates_to_product_reference": "5Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.src"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.src",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-common-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-common-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-common-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-headers-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-headers-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-headers-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-utils-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-utils-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-utils-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "nscd-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "nscd-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "nscd-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)",
"product_id": "6ComputeNode-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "nscd-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.src"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.src",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-common-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-common-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-common-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-headers-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-headers-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-headers-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-utils-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-utils-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-utils-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "nscd-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "nscd-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "nscd-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)",
"product_id": "6ComputeNode-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "nscd-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.47.el6_2.18.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.i686"
},
"product_reference": "glibc-0:2.12-1.47.el6_2.18.i686",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.47.el6_2.18.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.src"
},
"product_reference": "glibc-0:2.12-1.47.el6_2.18.src",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.47.el6_2.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.x86_64"
},
"product_reference": "glibc-0:2.12-1.47.el6_2.18.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.47.el6_2.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:glibc-common-0:2.12-1.47.el6_2.18.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.47.el6_2.18.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.47.el6_2.18.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:glibc-debuginfo-0:2.12-1.47.el6_2.18.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.47.el6_2.18.i686",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.47.el6_2.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:glibc-debuginfo-0:2.12-1.47.el6_2.18.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.47.el6_2.18.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.47.el6_2.18.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:glibc-debuginfo-common-0:2.12-1.47.el6_2.18.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.47.el6_2.18.i686",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.47.el6_2.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:glibc-debuginfo-common-0:2.12-1.47.el6_2.18.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.47.el6_2.18.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.47.el6_2.18.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:glibc-devel-0:2.12-1.47.el6_2.18.i686"
},
"product_reference": "glibc-devel-0:2.12-1.47.el6_2.18.i686",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.47.el6_2.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:glibc-devel-0:2.12-1.47.el6_2.18.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.47.el6_2.18.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.47.el6_2.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:glibc-headers-0:2.12-1.47.el6_2.18.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.47.el6_2.18.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.47.el6_2.18.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:glibc-static-0:2.12-1.47.el6_2.18.i686"
},
"product_reference": "glibc-static-0:2.12-1.47.el6_2.18.i686",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.47.el6_2.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:glibc-static-0:2.12-1.47.el6_2.18.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.47.el6_2.18.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.47.el6_2.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:glibc-utils-0:2.12-1.47.el6_2.18.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.47.el6_2.18.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.47.el6_2.18.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:nscd-0:2.12-1.47.el6_2.18.x86_64"
},
"product_reference": "nscd-0:2.12-1.47.el6_2.18.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.107.el6_4.10.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.i686"
},
"product_reference": "glibc-0:2.12-1.107.el6_4.10.i686",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.107.el6_4.10.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.src"
},
"product_reference": "glibc-0:2.12-1.107.el6_4.10.src",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.107.el6_4.10.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.x86_64"
},
"product_reference": "glibc-0:2.12-1.107.el6_4.10.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.107.el6_4.10.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:glibc-common-0:2.12-1.107.el6_4.10.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.107.el6_4.10.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.107.el6_4.10.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:glibc-debuginfo-0:2.12-1.107.el6_4.10.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.107.el6_4.10.i686",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.107.el6_4.10.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:glibc-debuginfo-0:2.12-1.107.el6_4.10.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.107.el6_4.10.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.107.el6_4.10.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:glibc-debuginfo-common-0:2.12-1.107.el6_4.10.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.107.el6_4.10.i686",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.107.el6_4.10.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:glibc-debuginfo-common-0:2.12-1.107.el6_4.10.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.107.el6_4.10.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.107.el6_4.10.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:glibc-devel-0:2.12-1.107.el6_4.10.i686"
},
"product_reference": "glibc-devel-0:2.12-1.107.el6_4.10.i686",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.107.el6_4.10.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:glibc-devel-0:2.12-1.107.el6_4.10.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.107.el6_4.10.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.107.el6_4.10.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:glibc-headers-0:2.12-1.107.el6_4.10.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.107.el6_4.10.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.107.el6_4.10.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:glibc-static-0:2.12-1.107.el6_4.10.i686"
},
"product_reference": "glibc-static-0:2.12-1.107.el6_4.10.i686",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.107.el6_4.10.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:glibc-static-0:2.12-1.107.el6_4.10.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.107.el6_4.10.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.107.el6_4.10.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:glibc-utils-0:2.12-1.107.el6_4.10.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.107.el6_4.10.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.107.el6_4.10.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)",
"product_id": "6Server-6.4.AUS:nscd-0:2.12-1.107.el6_4.10.x86_64"
},
"product_reference": "nscd-0:2.12-1.107.el6_4.10.x86_64",
"relates_to_product_reference": "6Server-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.132.el6_5.9.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.src"
},
"product_reference": "glibc-0:2.12-1.132.el6_5.9.src",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:glibc-common-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:glibc-devel-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-devel-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:glibc-devel-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:glibc-headers-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:glibc-static-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-static-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:glibc-static-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:glibc-utils-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:nscd-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "nscd-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.132.el6_5.9.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.src"
},
"product_reference": "glibc-0:2.12-1.132.el6_5.9.src",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:glibc-common-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:glibc-devel-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-devel-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:glibc-devel-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:glibc-headers-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:glibc-static-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-static-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:glibc-static-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:glibc-utils-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)",
"product_id": "6Server-6.5.TUS:nscd-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "nscd-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.149.el6_6.12.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.src"
},
"product_reference": "glibc-0:2.12-1.149.el6_6.12.src",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:glibc-common-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:glibc-devel-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-devel-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:glibc-devel-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:glibc-headers-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:glibc-static-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-static-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:glibc-static-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:glibc-utils-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:nscd-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "nscd-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.149.el6_6.12.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.src"
},
"product_reference": "glibc-0:2.12-1.149.el6_6.12.src",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:glibc-common-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:glibc-devel-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-devel-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:glibc-devel-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:glibc-headers-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:glibc-static-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-static-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:glibc-static-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:glibc-utils-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)",
"product_id": "6Server-6.6.TUS:nscd-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "nscd-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.src"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.src",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-common-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-common-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-common-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-headers-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-headers-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-headers-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-utils-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-utils-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-utils-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "nscd-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "nscd-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "nscd-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)",
"product_id": "6Server-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "nscd-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.47.el6_2.18.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.i686"
},
"product_reference": "glibc-0:2.12-1.47.el6_2.18.i686",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.47.el6_2.18.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.src"
},
"product_reference": "glibc-0:2.12-1.47.el6_2.18.src",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.47.el6_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.x86_64"
},
"product_reference": "glibc-0:2.12-1.47.el6_2.18.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.47.el6_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:glibc-common-0:2.12-1.47.el6_2.18.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.47.el6_2.18.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.47.el6_2.18.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:glibc-debuginfo-0:2.12-1.47.el6_2.18.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.47.el6_2.18.i686",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.47.el6_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:glibc-debuginfo-0:2.12-1.47.el6_2.18.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.47.el6_2.18.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.47.el6_2.18.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:glibc-debuginfo-common-0:2.12-1.47.el6_2.18.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.47.el6_2.18.i686",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.47.el6_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:glibc-debuginfo-common-0:2.12-1.47.el6_2.18.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.47.el6_2.18.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.47.el6_2.18.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:glibc-devel-0:2.12-1.47.el6_2.18.i686"
},
"product_reference": "glibc-devel-0:2.12-1.47.el6_2.18.i686",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.47.el6_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:glibc-devel-0:2.12-1.47.el6_2.18.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.47.el6_2.18.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.47.el6_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:glibc-headers-0:2.12-1.47.el6_2.18.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.47.el6_2.18.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.47.el6_2.18.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:glibc-static-0:2.12-1.47.el6_2.18.i686"
},
"product_reference": "glibc-static-0:2.12-1.47.el6_2.18.i686",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.47.el6_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:glibc-static-0:2.12-1.47.el6_2.18.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.47.el6_2.18.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.47.el6_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:glibc-utils-0:2.12-1.47.el6_2.18.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.47.el6_2.18.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.47.el6_2.18.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:nscd-0:2.12-1.47.el6_2.18.x86_64"
},
"product_reference": "nscd-0:2.12-1.47.el6_2.18.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.107.el6_4.10.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.i686"
},
"product_reference": "glibc-0:2.12-1.107.el6_4.10.i686",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.107.el6_4.10.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.src"
},
"product_reference": "glibc-0:2.12-1.107.el6_4.10.src",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.107.el6_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.x86_64"
},
"product_reference": "glibc-0:2.12-1.107.el6_4.10.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.107.el6_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:glibc-common-0:2.12-1.107.el6_4.10.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.107.el6_4.10.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.107.el6_4.10.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:glibc-debuginfo-0:2.12-1.107.el6_4.10.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.107.el6_4.10.i686",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.107.el6_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:glibc-debuginfo-0:2.12-1.107.el6_4.10.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.107.el6_4.10.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.107.el6_4.10.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:glibc-debuginfo-common-0:2.12-1.107.el6_4.10.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.107.el6_4.10.i686",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.107.el6_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:glibc-debuginfo-common-0:2.12-1.107.el6_4.10.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.107.el6_4.10.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.107.el6_4.10.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:glibc-devel-0:2.12-1.107.el6_4.10.i686"
},
"product_reference": "glibc-devel-0:2.12-1.107.el6_4.10.i686",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.107.el6_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:glibc-devel-0:2.12-1.107.el6_4.10.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.107.el6_4.10.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.107.el6_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:glibc-headers-0:2.12-1.107.el6_4.10.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.107.el6_4.10.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.107.el6_4.10.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:glibc-static-0:2.12-1.107.el6_4.10.i686"
},
"product_reference": "glibc-static-0:2.12-1.107.el6_4.10.i686",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.107.el6_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:glibc-static-0:2.12-1.107.el6_4.10.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.107.el6_4.10.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.107.el6_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:glibc-utils-0:2.12-1.107.el6_4.10.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.107.el6_4.10.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.107.el6_4.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)",
"product_id": "6Server-optional-6.4.AUS:nscd-0:2.12-1.107.el6_4.10.x86_64"
},
"product_reference": "nscd-0:2.12-1.107.el6_4.10.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.132.el6_5.9.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.src"
},
"product_reference": "glibc-0:2.12-1.132.el6_5.9.src",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:glibc-common-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:glibc-devel-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-devel-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:glibc-devel-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:glibc-headers-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:glibc-static-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-static-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:glibc-static-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:glibc-utils-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:nscd-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "nscd-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.132.el6_5.9.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.src"
},
"product_reference": "glibc-0:2.12-1.132.el6_5.9.src",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:glibc-common-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:glibc-devel-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-devel-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:glibc-devel-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:glibc-headers-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.132.el6_5.9.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:glibc-static-0:2.12-1.132.el6_5.9.i686"
},
"product_reference": "glibc-static-0:2.12-1.132.el6_5.9.i686",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:glibc-static-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:glibc-utils-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.132.el6_5.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)",
"product_id": "6Server-optional-6.5.TUS:nscd-0:2.12-1.132.el6_5.9.x86_64"
},
"product_reference": "nscd-0:2.12-1.132.el6_5.9.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.149.el6_6.12.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.src"
},
"product_reference": "glibc-0:2.12-1.149.el6_6.12.src",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:glibc-common-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:glibc-devel-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-devel-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:glibc-devel-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:glibc-headers-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:glibc-static-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-static-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:glibc-static-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:glibc-utils-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:nscd-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "nscd-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.149.el6_6.12.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.src"
},
"product_reference": "glibc-0:2.12-1.149.el6_6.12.src",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:glibc-common-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:glibc-devel-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-devel-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:glibc-devel-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:glibc-headers-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.149.el6_6.12.i686 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:glibc-static-0:2.12-1.149.el6_6.12.i686"
},
"product_reference": "glibc-static-0:2.12-1.149.el6_6.12.i686",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:glibc-static-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:glibc-utils-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.149.el6_6.12.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)",
"product_id": "6Server-optional-6.6.TUS:nscd-0:2.12-1.149.el6_6.12.x86_64"
},
"product_reference": "nscd-0:2.12-1.149.el6_6.12.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.src"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.src",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-common-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-common-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-common-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-common-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-devel-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-headers-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-headers-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-headers-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-headers-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.ppc",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.s390",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-static-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "glibc-utils-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "glibc-utils-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "glibc-utils-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "glibc-utils-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.166.el6_7.8.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.i686"
},
"product_reference": "nscd-0:2.12-1.166.el6_7.8.i686",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.166.el6_7.8.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.ppc64"
},
"product_reference": "nscd-0:2.12-1.166.el6_7.8.ppc64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.166.el6_7.8.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.s390x"
},
"product_reference": "nscd-0:2.12-1.166.el6_7.8.s390x",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.12-1.166.el6_7.8.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)",
"product_id": "6Server-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.x86_64"
},
"product_reference": "nscd-0:2.12-1.166.el6_7.8.x86_64",
"relates_to_product_reference": "6Server-optional-6.7.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.src"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.src",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-common-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-common-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-common-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-common-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-headers-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-headers-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-headers-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-headers-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-utils-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-utils-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-utils-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-utils-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "nscd-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "nscd-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:nscd-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "nscd-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.2)",
"product_id": "7ComputeNode-7.2.EUS:nscd-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "nscd-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7ComputeNode-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.src"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.src",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-common-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-common-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-common-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-common-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-headers-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-headers-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-headers-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-headers-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-utils-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-utils-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-utils-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-utils-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "nscd-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "nscd-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "nscd-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2)",
"product_id": "7ComputeNode-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "nscd-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.src"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.src",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-common-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-common-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-common-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-common-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-headers-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-headers-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-headers-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-headers-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-utils-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-utils-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-utils-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-utils-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "nscd-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "nscd-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:nscd-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "nscd-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.2)",
"product_id": "7Server-7.2.EUS:nscd-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "nscd-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.src"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.src",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-common-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-common-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-common-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-common-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-common-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-debuginfo-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-devel-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-headers-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-headers-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-headers-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-headers-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-headers-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.i686"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.i686",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.ppc as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.ppc",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.s390 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.s390",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-static-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-static-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "glibc-utils-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "glibc-utils-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "glibc-utils-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-utils-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "glibc-utils-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-106.el7_2.9.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64"
},
"product_reference": "nscd-0:2.17-106.el7_2.9.ppc64",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-106.el7_2.9.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64le"
},
"product_reference": "nscd-0:2.17-106.el7_2.9.ppc64le",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-106.el7_2.9.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.s390x"
},
"product_reference": "nscd-0:2.17-106.el7_2.9.s390x",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-0:2.17-106.el7_2.9.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.2)",
"product_id": "7Server-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.x86_64"
},
"product_reference": "nscd-0:2.17-106.el7_2.9.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Qualys Research Labs"
]
}
],
"cve": "CVE-2017-1000366",
"discovery_date": "2017-05-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1452543"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: heap/stack gap jumping via unbounded stack allocations",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a glibc-side mitigation. For a related kernel mitigation please see https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-1000364 .",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.9.AUS:glibc-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-0:2.5-107.el5_9.9.i686",
"5Server-5.9.AUS:glibc-0:2.5-107.el5_9.9.src",
"5Server-5.9.AUS:glibc-0:2.5-107.el5_9.9.x86_64",
"5Server-5.9.AUS:glibc-common-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-common-0:2.5-107.el5_9.9.x86_64",
"5Server-5.9.AUS:glibc-debuginfo-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-debuginfo-0:2.5-107.el5_9.9.i686",
"5Server-5.9.AUS:glibc-debuginfo-0:2.5-107.el5_9.9.x86_64",
"5Server-5.9.AUS:glibc-debuginfo-common-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-devel-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-devel-0:2.5-107.el5_9.9.x86_64",
"5Server-5.9.AUS:glibc-headers-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-headers-0:2.5-107.el5_9.9.x86_64",
"5Server-5.9.AUS:glibc-utils-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-utils-0:2.5-107.el5_9.9.x86_64",
"5Server-5.9.AUS:nscd-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:nscd-0:2.5-107.el5_9.9.x86_64",
"5Server-ELS:glibc-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-0:2.5-123.el5_11.4.i686",
"5Server-ELS:glibc-0:2.5-123.el5_11.4.s390",
"5Server-ELS:glibc-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:glibc-0:2.5-123.el5_11.4.src",
"5Server-ELS:glibc-0:2.5-123.el5_11.4.x86_64",
"5Server-ELS:glibc-common-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-common-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:glibc-common-0:2.5-123.el5_11.4.x86_64",
"5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.i686",
"5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.s390",
"5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.x86_64",
"5Server-ELS:glibc-debuginfo-common-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-devel-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-devel-0:2.5-123.el5_11.4.s390",
"5Server-ELS:glibc-devel-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:glibc-devel-0:2.5-123.el5_11.4.x86_64",
"5Server-ELS:glibc-headers-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-headers-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:glibc-headers-0:2.5-123.el5_11.4.x86_64",
"5Server-ELS:glibc-utils-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-utils-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:glibc-utils-0:2.5-123.el5_11.4.x86_64",
"5Server-ELS:nscd-0:2.5-123.el5_11.4.i386",
"5Server-ELS:nscd-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:nscd-0:2.5-123.el5_11.4.x86_64",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.src",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.src",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.i686",
"6Server-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.src",
"6Server-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-common-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-debuginfo-0:2.12-1.47.el6_2.18.i686",
"6Server-6.2.AUS:glibc-debuginfo-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-debuginfo-common-0:2.12-1.47.el6_2.18.i686",
"6Server-6.2.AUS:glibc-debuginfo-common-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-devel-0:2.12-1.47.el6_2.18.i686",
"6Server-6.2.AUS:glibc-devel-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-headers-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-static-0:2.12-1.47.el6_2.18.i686",
"6Server-6.2.AUS:glibc-static-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-utils-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:nscd-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.i686",
"6Server-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.src",
"6Server-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-common-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-debuginfo-0:2.12-1.107.el6_4.10.i686",
"6Server-6.4.AUS:glibc-debuginfo-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-debuginfo-common-0:2.12-1.107.el6_4.10.i686",
"6Server-6.4.AUS:glibc-debuginfo-common-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-devel-0:2.12-1.107.el6_4.10.i686",
"6Server-6.4.AUS:glibc-devel-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-headers-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-static-0:2.12-1.107.el6_4.10.i686",
"6Server-6.4.AUS:glibc-static-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-utils-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:nscd-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.src",
"6Server-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.AUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.AUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-devel-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.AUS:glibc-devel-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-headers-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-static-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.AUS:glibc-static-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-utils-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:nscd-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.src",
"6Server-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.TUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.TUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-devel-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.TUS:glibc-devel-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-headers-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-static-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.TUS:glibc-static-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-utils-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:nscd-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.src",
"6Server-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.AUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.AUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-devel-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.AUS:glibc-devel-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-headers-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-static-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.AUS:glibc-static-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-utils-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:nscd-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.src",
"6Server-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.TUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.TUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-devel-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.TUS:glibc-devel-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-headers-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-static-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.TUS:glibc-static-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-utils-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:nscd-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.src",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc",
"6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390",
"6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc",
"6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390",
"6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc",
"6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390",
"6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc",
"6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390",
"6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.i686",
"6Server-optional-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.src",
"6Server-optional-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-common-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-debuginfo-0:2.12-1.47.el6_2.18.i686",
"6Server-optional-6.2.AUS:glibc-debuginfo-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-debuginfo-common-0:2.12-1.47.el6_2.18.i686",
"6Server-optional-6.2.AUS:glibc-debuginfo-common-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-devel-0:2.12-1.47.el6_2.18.i686",
"6Server-optional-6.2.AUS:glibc-devel-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-headers-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-static-0:2.12-1.47.el6_2.18.i686",
"6Server-optional-6.2.AUS:glibc-static-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-utils-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:nscd-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.i686",
"6Server-optional-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.src",
"6Server-optional-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-common-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-debuginfo-0:2.12-1.107.el6_4.10.i686",
"6Server-optional-6.4.AUS:glibc-debuginfo-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-debuginfo-common-0:2.12-1.107.el6_4.10.i686",
"6Server-optional-6.4.AUS:glibc-debuginfo-common-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-devel-0:2.12-1.107.el6_4.10.i686",
"6Server-optional-6.4.AUS:glibc-devel-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-headers-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-static-0:2.12-1.107.el6_4.10.i686",
"6Server-optional-6.4.AUS:glibc-static-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-utils-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:nscd-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.src",
"6Server-optional-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.AUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.AUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-devel-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.AUS:glibc-devel-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-headers-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-static-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.AUS:glibc-static-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-utils-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:nscd-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.src",
"6Server-optional-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.TUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.TUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-devel-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.TUS:glibc-devel-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-headers-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-static-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.TUS:glibc-static-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-utils-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:nscd-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.src",
"6Server-optional-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.AUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.AUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-devel-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.AUS:glibc-devel-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-headers-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-static-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.AUS:glibc-static-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-utils-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:nscd-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.src",
"6Server-optional-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.TUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.TUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-devel-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.TUS:glibc-devel-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-headers-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-static-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.TUS:glibc-static-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-utils-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:nscd-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.src",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc",
"6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390",
"6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc",
"6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390",
"6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc",
"6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390",
"6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc",
"6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390",
"6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.x86_64",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.i686",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.src",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.i686",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.i686",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.i686",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.i686",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:nscd-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:nscd-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.i686",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.src",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.i686",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.i686",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.i686",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.i686",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.i686",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.src",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.i686",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.i686",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.i686",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.i686",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:nscd-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:nscd-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.i686",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.src",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.i686",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.i686",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.i686",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.i686",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000366"
},
{
"category": "external",
"summary": "RHBZ#1452543",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452543"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000366",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000366"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000366",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000366"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/stackguard",
"url": "https://access.redhat.com/security/vulnerabilities/stackguard"
},
{
"category": "external",
"summary": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt",
"url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
}
],
"release_date": "2017-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-06-19T20:12:32+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the glibc library must be restarted, or the system rebooted.",
"product_ids": [
"5Server-5.9.AUS:glibc-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-0:2.5-107.el5_9.9.i686",
"5Server-5.9.AUS:glibc-0:2.5-107.el5_9.9.src",
"5Server-5.9.AUS:glibc-0:2.5-107.el5_9.9.x86_64",
"5Server-5.9.AUS:glibc-common-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-common-0:2.5-107.el5_9.9.x86_64",
"5Server-5.9.AUS:glibc-debuginfo-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-debuginfo-0:2.5-107.el5_9.9.i686",
"5Server-5.9.AUS:glibc-debuginfo-0:2.5-107.el5_9.9.x86_64",
"5Server-5.9.AUS:glibc-debuginfo-common-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-devel-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-devel-0:2.5-107.el5_9.9.x86_64",
"5Server-5.9.AUS:glibc-headers-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-headers-0:2.5-107.el5_9.9.x86_64",
"5Server-5.9.AUS:glibc-utils-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-utils-0:2.5-107.el5_9.9.x86_64",
"5Server-5.9.AUS:nscd-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:nscd-0:2.5-107.el5_9.9.x86_64",
"5Server-ELS:glibc-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-0:2.5-123.el5_11.4.i686",
"5Server-ELS:glibc-0:2.5-123.el5_11.4.s390",
"5Server-ELS:glibc-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:glibc-0:2.5-123.el5_11.4.src",
"5Server-ELS:glibc-0:2.5-123.el5_11.4.x86_64",
"5Server-ELS:glibc-common-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-common-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:glibc-common-0:2.5-123.el5_11.4.x86_64",
"5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.i686",
"5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.s390",
"5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.x86_64",
"5Server-ELS:glibc-debuginfo-common-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-devel-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-devel-0:2.5-123.el5_11.4.s390",
"5Server-ELS:glibc-devel-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:glibc-devel-0:2.5-123.el5_11.4.x86_64",
"5Server-ELS:glibc-headers-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-headers-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:glibc-headers-0:2.5-123.el5_11.4.x86_64",
"5Server-ELS:glibc-utils-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-utils-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:glibc-utils-0:2.5-123.el5_11.4.x86_64",
"5Server-ELS:nscd-0:2.5-123.el5_11.4.i386",
"5Server-ELS:nscd-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:nscd-0:2.5-123.el5_11.4.x86_64",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.src",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.src",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.i686",
"6Server-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.src",
"6Server-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-common-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-debuginfo-0:2.12-1.47.el6_2.18.i686",
"6Server-6.2.AUS:glibc-debuginfo-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-debuginfo-common-0:2.12-1.47.el6_2.18.i686",
"6Server-6.2.AUS:glibc-debuginfo-common-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-devel-0:2.12-1.47.el6_2.18.i686",
"6Server-6.2.AUS:glibc-devel-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-headers-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-static-0:2.12-1.47.el6_2.18.i686",
"6Server-6.2.AUS:glibc-static-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-utils-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:nscd-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.i686",
"6Server-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.src",
"6Server-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-common-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-debuginfo-0:2.12-1.107.el6_4.10.i686",
"6Server-6.4.AUS:glibc-debuginfo-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-debuginfo-common-0:2.12-1.107.el6_4.10.i686",
"6Server-6.4.AUS:glibc-debuginfo-common-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-devel-0:2.12-1.107.el6_4.10.i686",
"6Server-6.4.AUS:glibc-devel-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-headers-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-static-0:2.12-1.107.el6_4.10.i686",
"6Server-6.4.AUS:glibc-static-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-utils-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:nscd-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.src",
"6Server-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.AUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.AUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-devel-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.AUS:glibc-devel-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-headers-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-static-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.AUS:glibc-static-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-utils-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:nscd-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.src",
"6Server-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.TUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.TUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-devel-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.TUS:glibc-devel-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-headers-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-static-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.TUS:glibc-static-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-utils-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:nscd-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.src",
"6Server-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.AUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.AUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-devel-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.AUS:glibc-devel-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-headers-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-static-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.AUS:glibc-static-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-utils-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:nscd-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.src",
"6Server-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.TUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.TUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-devel-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.TUS:glibc-devel-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-headers-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-static-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.TUS:glibc-static-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-utils-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:nscd-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.src",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc",
"6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390",
"6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc",
"6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390",
"6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc",
"6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390",
"6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc",
"6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390",
"6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.i686",
"6Server-optional-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.src",
"6Server-optional-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-common-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-debuginfo-0:2.12-1.47.el6_2.18.i686",
"6Server-optional-6.2.AUS:glibc-debuginfo-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-debuginfo-common-0:2.12-1.47.el6_2.18.i686",
"6Server-optional-6.2.AUS:glibc-debuginfo-common-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-devel-0:2.12-1.47.el6_2.18.i686",
"6Server-optional-6.2.AUS:glibc-devel-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-headers-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-static-0:2.12-1.47.el6_2.18.i686",
"6Server-optional-6.2.AUS:glibc-static-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-utils-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:nscd-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.i686",
"6Server-optional-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.src",
"6Server-optional-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-common-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-debuginfo-0:2.12-1.107.el6_4.10.i686",
"6Server-optional-6.4.AUS:glibc-debuginfo-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-debuginfo-common-0:2.12-1.107.el6_4.10.i686",
"6Server-optional-6.4.AUS:glibc-debuginfo-common-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-devel-0:2.12-1.107.el6_4.10.i686",
"6Server-optional-6.4.AUS:glibc-devel-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-headers-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-static-0:2.12-1.107.el6_4.10.i686",
"6Server-optional-6.4.AUS:glibc-static-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-utils-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:nscd-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.src",
"6Server-optional-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.AUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.AUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-devel-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.AUS:glibc-devel-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-headers-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-static-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.AUS:glibc-static-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-utils-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:nscd-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.src",
"6Server-optional-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.TUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.TUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-devel-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.TUS:glibc-devel-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-headers-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-static-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.TUS:glibc-static-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-utils-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:nscd-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.src",
"6Server-optional-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.AUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.AUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-devel-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.AUS:glibc-devel-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-headers-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-static-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.AUS:glibc-static-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-utils-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:nscd-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.src",
"6Server-optional-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.TUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.TUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-devel-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.TUS:glibc-devel-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-headers-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-static-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.TUS:glibc-static-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-utils-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:nscd-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.src",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc",
"6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390",
"6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc",
"6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390",
"6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc",
"6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390",
"6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc",
"6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390",
"6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.x86_64",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.i686",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.src",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.i686",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.i686",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.i686",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.i686",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:nscd-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:nscd-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.i686",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.src",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.i686",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.i686",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.i686",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.i686",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.i686",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.src",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.i686",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.i686",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.i686",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.i686",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:nscd-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:nscd-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.i686",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.src",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.i686",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.i686",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.i686",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.i686",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1479"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"5Server-5.9.AUS:glibc-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-0:2.5-107.el5_9.9.i686",
"5Server-5.9.AUS:glibc-0:2.5-107.el5_9.9.src",
"5Server-5.9.AUS:glibc-0:2.5-107.el5_9.9.x86_64",
"5Server-5.9.AUS:glibc-common-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-common-0:2.5-107.el5_9.9.x86_64",
"5Server-5.9.AUS:glibc-debuginfo-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-debuginfo-0:2.5-107.el5_9.9.i686",
"5Server-5.9.AUS:glibc-debuginfo-0:2.5-107.el5_9.9.x86_64",
"5Server-5.9.AUS:glibc-debuginfo-common-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-devel-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-devel-0:2.5-107.el5_9.9.x86_64",
"5Server-5.9.AUS:glibc-headers-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-headers-0:2.5-107.el5_9.9.x86_64",
"5Server-5.9.AUS:glibc-utils-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:glibc-utils-0:2.5-107.el5_9.9.x86_64",
"5Server-5.9.AUS:nscd-0:2.5-107.el5_9.9.i386",
"5Server-5.9.AUS:nscd-0:2.5-107.el5_9.9.x86_64",
"5Server-ELS:glibc-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-0:2.5-123.el5_11.4.i686",
"5Server-ELS:glibc-0:2.5-123.el5_11.4.s390",
"5Server-ELS:glibc-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:glibc-0:2.5-123.el5_11.4.src",
"5Server-ELS:glibc-0:2.5-123.el5_11.4.x86_64",
"5Server-ELS:glibc-common-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-common-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:glibc-common-0:2.5-123.el5_11.4.x86_64",
"5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.i686",
"5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.s390",
"5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:glibc-debuginfo-0:2.5-123.el5_11.4.x86_64",
"5Server-ELS:glibc-debuginfo-common-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-devel-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-devel-0:2.5-123.el5_11.4.s390",
"5Server-ELS:glibc-devel-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:glibc-devel-0:2.5-123.el5_11.4.x86_64",
"5Server-ELS:glibc-headers-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-headers-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:glibc-headers-0:2.5-123.el5_11.4.x86_64",
"5Server-ELS:glibc-utils-0:2.5-123.el5_11.4.i386",
"5Server-ELS:glibc-utils-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:glibc-utils-0:2.5-123.el5_11.4.x86_64",
"5Server-ELS:nscd-0:2.5-123.el5_11.4.i386",
"5Server-ELS:nscd-0:2.5-123.el5_11.4.s390x",
"5Server-ELS:nscd-0:2.5-123.el5_11.4.x86_64",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.src",
"6ComputeNode-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.src",
"6ComputeNode-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc",
"6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390",
"6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.x86_64",
"6ComputeNode-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.i686",
"6ComputeNode-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.ppc64",
"6ComputeNode-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.s390x",
"6ComputeNode-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.i686",
"6Server-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.src",
"6Server-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-common-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-debuginfo-0:2.12-1.47.el6_2.18.i686",
"6Server-6.2.AUS:glibc-debuginfo-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-debuginfo-common-0:2.12-1.47.el6_2.18.i686",
"6Server-6.2.AUS:glibc-debuginfo-common-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-devel-0:2.12-1.47.el6_2.18.i686",
"6Server-6.2.AUS:glibc-devel-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-headers-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-static-0:2.12-1.47.el6_2.18.i686",
"6Server-6.2.AUS:glibc-static-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:glibc-utils-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.2.AUS:nscd-0:2.12-1.47.el6_2.18.x86_64",
"6Server-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.i686",
"6Server-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.src",
"6Server-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-common-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-debuginfo-0:2.12-1.107.el6_4.10.i686",
"6Server-6.4.AUS:glibc-debuginfo-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-debuginfo-common-0:2.12-1.107.el6_4.10.i686",
"6Server-6.4.AUS:glibc-debuginfo-common-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-devel-0:2.12-1.107.el6_4.10.i686",
"6Server-6.4.AUS:glibc-devel-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-headers-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-static-0:2.12-1.107.el6_4.10.i686",
"6Server-6.4.AUS:glibc-static-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:glibc-utils-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.4.AUS:nscd-0:2.12-1.107.el6_4.10.x86_64",
"6Server-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.src",
"6Server-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.AUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.AUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-devel-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.AUS:glibc-devel-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-headers-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-static-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.AUS:glibc-static-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:glibc-utils-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.AUS:nscd-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.src",
"6Server-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.TUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.TUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-devel-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.TUS:glibc-devel-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-headers-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-static-0:2.12-1.132.el6_5.9.i686",
"6Server-6.5.TUS:glibc-static-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:glibc-utils-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.5.TUS:nscd-0:2.12-1.132.el6_5.9.x86_64",
"6Server-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.src",
"6Server-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.AUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.AUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-devel-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.AUS:glibc-devel-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-headers-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-static-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.AUS:glibc-static-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:glibc-utils-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.AUS:nscd-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.src",
"6Server-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.TUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.TUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-devel-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.TUS:glibc-devel-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-headers-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-static-0:2.12-1.149.el6_6.12.i686",
"6Server-6.6.TUS:glibc-static-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:glibc-utils-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.6.TUS:nscd-0:2.12-1.149.el6_6.12.x86_64",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.src",
"6Server-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc",
"6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390",
"6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc",
"6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390",
"6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc",
"6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390",
"6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc",
"6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390",
"6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.x86_64",
"6Server-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.i686",
"6Server-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.ppc64",
"6Server-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.s390x",
"6Server-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.i686",
"6Server-optional-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.src",
"6Server-optional-6.2.AUS:glibc-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-common-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-debuginfo-0:2.12-1.47.el6_2.18.i686",
"6Server-optional-6.2.AUS:glibc-debuginfo-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-debuginfo-common-0:2.12-1.47.el6_2.18.i686",
"6Server-optional-6.2.AUS:glibc-debuginfo-common-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-devel-0:2.12-1.47.el6_2.18.i686",
"6Server-optional-6.2.AUS:glibc-devel-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-headers-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-static-0:2.12-1.47.el6_2.18.i686",
"6Server-optional-6.2.AUS:glibc-static-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:glibc-utils-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.2.AUS:nscd-0:2.12-1.47.el6_2.18.x86_64",
"6Server-optional-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.i686",
"6Server-optional-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.src",
"6Server-optional-6.4.AUS:glibc-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-common-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-debuginfo-0:2.12-1.107.el6_4.10.i686",
"6Server-optional-6.4.AUS:glibc-debuginfo-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-debuginfo-common-0:2.12-1.107.el6_4.10.i686",
"6Server-optional-6.4.AUS:glibc-debuginfo-common-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-devel-0:2.12-1.107.el6_4.10.i686",
"6Server-optional-6.4.AUS:glibc-devel-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-headers-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-static-0:2.12-1.107.el6_4.10.i686",
"6Server-optional-6.4.AUS:glibc-static-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:glibc-utils-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.4.AUS:nscd-0:2.12-1.107.el6_4.10.x86_64",
"6Server-optional-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.src",
"6Server-optional-6.5.AUS:glibc-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.AUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.AUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-devel-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.AUS:glibc-devel-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-headers-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-static-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.AUS:glibc-static-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:glibc-utils-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.AUS:nscd-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.src",
"6Server-optional-6.5.TUS:glibc-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.TUS:glibc-debuginfo-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.TUS:glibc-debuginfo-common-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-devel-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.TUS:glibc-devel-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-headers-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-static-0:2.12-1.132.el6_5.9.i686",
"6Server-optional-6.5.TUS:glibc-static-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:glibc-utils-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.5.TUS:nscd-0:2.12-1.132.el6_5.9.x86_64",
"6Server-optional-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.src",
"6Server-optional-6.6.AUS:glibc-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.AUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.AUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-devel-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.AUS:glibc-devel-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-headers-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-static-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.AUS:glibc-static-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:glibc-utils-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.AUS:nscd-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.src",
"6Server-optional-6.6.TUS:glibc-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.TUS:glibc-debuginfo-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.TUS:glibc-debuginfo-common-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-devel-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.TUS:glibc-devel-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-headers-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-static-0:2.12-1.149.el6_6.12.i686",
"6Server-optional-6.6.TUS:glibc-static-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:glibc-utils-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.6.TUS:nscd-0:2.12-1.149.el6_6.12.x86_64",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.src",
"6Server-optional-6.7.EUS:glibc-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-common-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc",
"6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390",
"6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-debuginfo-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc",
"6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390",
"6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-debuginfo-common-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc",
"6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390",
"6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-devel-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-headers-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc",
"6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390",
"6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-static-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:glibc-utils-0:2.12-1.166.el6_7.8.x86_64",
"6Server-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.i686",
"6Server-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.ppc64",
"6Server-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.s390x",
"6Server-optional-6.7.EUS:nscd-0:2.12-1.166.el6_7.8.x86_64",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.i686",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.src",
"7ComputeNode-7.2.EUS:glibc-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.i686",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.i686",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.i686",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.i686",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-7.2.EUS:nscd-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-7.2.EUS:nscd-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.i686",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.src",
"7ComputeNode-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.i686",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.i686",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.i686",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.i686",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.x86_64",
"7ComputeNode-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64",
"7ComputeNode-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64le",
"7ComputeNode-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.s390x",
"7ComputeNode-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.i686",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.src",
"7Server-7.2.EUS:glibc-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.i686",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.i686",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.i686",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.i686",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.x86_64",
"7Server-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64",
"7Server-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64le",
"7Server-7.2.EUS:nscd-0:2.17-106.el7_2.9.s390x",
"7Server-7.2.EUS:nscd-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.i686",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.src",
"7Server-optional-7.2.EUS:glibc-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-common-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.i686",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-debuginfo-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.i686",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-debuginfo-common-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.i686",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-devel-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-headers-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.i686",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-static-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:glibc-utils-0:2.17-106.el7_2.9.x86_64",
"7Server-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64",
"7Server-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.ppc64le",
"7Server-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.s390x",
"7Server-optional-7.2.EUS:nscd-0:2.17-106.el7_2.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "glibc: heap/stack gap jumping via unbounded stack allocations"
}
]
}
CERTFR-2017-AVI-365
Vulnerability from certfr_avis - Published: 2017-10-18 - Updated: 2017-10-18
De multiples vulnérabilités ont été découvertes dans Juniper Junos Space. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Junos Space versions antérieures à 17.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Junos Space versions ant\u00e9rieures \u00e0 17.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-1547",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1547"
},
{
"name": "CVE-2017-1000369",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000369"
},
{
"name": "CVE-2017-1000365",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000365"
},
{
"name": "CVE-2017-1000379",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000379"
},
{
"name": "CVE-2017-7494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7494"
},
{
"name": "CVE-2016-1550",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1550"
},
{
"name": "CVE-2016-1549",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1549"
},
{
"name": "CVE-2016-1551",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1551"
},
{
"name": "CVE-2017-1000366",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000366"
},
{
"name": "CVE-2017-10612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10612"
},
{
"name": "CVE-2016-2516",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2516"
},
{
"name": "CVE-2016-2518",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2518"
},
{
"name": "CVE-2017-10624",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10624"
},
{
"name": "CVE-2017-1000364",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000364"
},
{
"name": "CVE-2016-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2519"
},
{
"name": "CVE-2017-1000367",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000367"
},
{
"name": "CVE-2017-10623",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10623"
},
{
"name": "CVE-2016-2517",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2517"
},
{
"name": "CVE-2017-1000371",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000371"
},
{
"name": "CVE-2016-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1548"
}
],
"initial_release_date": "2017-10-18T00:00:00",
"last_revision_date": "2017-10-18T00:00:00",
"links": [],
"reference": "CERTFR-2017-AVI-365",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2017-10-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Junos\nSpace. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10826 du 18 octobre 2017",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10826\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2017-AVI-231
Vulnerability from certfr_avis - Published: 2017-07-20 - Updated: 2017-07-20
De multiples vulnérabilités ont été corrigées dans Oracle VM Server pour x86 et Oracle Linux. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Linux versions 5, 6 et 7",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle VM Server pour x86 versions 3.2, 3.3 et 3.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-7895",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7895"
},
{
"name": "CVE-2017-7752",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7752"
},
{
"name": "CVE-2017-9524",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9524"
},
{
"name": "CVE-2017-5472",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5472"
},
{
"name": "CVE-2017-9462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9462"
},
{
"name": "CVE-2017-7645",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7645"
},
{
"name": "CVE-2017-3142",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3142"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-6214",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6214"
},
{
"name": "CVE-2017-9148",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9148"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3143"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7757",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7757"
},
{
"name": "CVE-2017-7758",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7758"
},
{
"name": "CVE-2017-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2583"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-1000366",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000366"
},
{
"name": "CVE-2017-1000368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000368"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-7477",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7477"
},
{
"name": "CVE-2017-7750",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7750"
},
{
"name": "CVE-2017-1000364",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000364"
},
{
"name": "CVE-2017-7754",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7754"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7749",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7749"
},
{
"name": "CVE-2017-7764",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7764"
},
{
"name": "CVE-2017-7751",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7751"
},
{
"name": "CVE-2017-5470",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5470"
},
{
"name": "CVE-2017-7756",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7756"
},
{
"name": "CVE-2016-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8743"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
}
],
"initial_release_date": "2017-07-20T00:00:00",
"last_revision_date": "2017-07-20T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 VM Server pour x86 Linux du 17 juillet 2017",
"url": "https://www.oracle.com/technetwork/topics/security/ovmbulletinjul2017-3832369.html"
}
],
"reference": "CERTFR-2017-AVI-231",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-07-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle VM Server pour x86 et Oracle Linux\u003c/span\u003e.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle VM Server pour x86 et Oracle Linux",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle VM Server pour x86 Linux du 17 juillet 2017",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle Linux du 17 juillet 2017",
"url": "https://www.oracle.com/technetwork/topics/security/linuxbulletinjul2017-3832368.html"
}
]
}
CERTFR-2017-AVI-238
Vulnerability from certfr_avis - Published: 2017-07-27 - Updated: 2017-07-27
De multiples vulnérabilités ont été corrigées dans McAfee Web Gateway. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "McAfee Web Gateway (MWG) versions ant\u00e9rieures \u00e0 7.6.2.15",
"product": {
"name": "N/A",
"vendor": {
"name": "McAfee",
"scada": false
}
}
},
{
"description": "McAfee Web Gateway (MWG) versions ant\u00e9rieures \u00e0 7.7.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "McAfee",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-6706",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6706"
},
{
"name": "CVE-2017-1000366",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000366"
},
{
"name": "CVE-2017-1000368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000368"
},
{
"name": "CVE-2017-1000364",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000364"
}
],
"initial_release_date": "2017-07-27T00:00:00",
"last_revision_date": "2017-07-27T00:00:00",
"links": [],
"reference": "CERTFR-2017-AVI-238",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-07-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMcAfee Web Gateway\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et une atteinte\n\u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans McAfee Web Gateway",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 McAfee SB10205 du 25 juillet 2017",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10205\u0026actp=null\u0026viewlocale=en_US\u0026showDraft=false\u0026platinum_status=false\u0026locale=en_US"
}
]
}
CERTFR-2019-AVI-014
Vulnerability from certfr_avis - Published: 2019-01-10 - Updated: 2019-01-10
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Centreon | Web | SRC Series Application Server et Web Administrator versions antérieures à 4.12.0-R1 | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1 sur vMX Series | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53, 15.1, 15.1X53, 16.1, 17.1, 17.2, 17.3, 17.4, 18.1 sur EX2300/EX3400, EX2300/EX3400 series, EX4600, QFX3K series, QFX5200/QFX5110 series et QFX5k series | ||
| Juniper Networks | Junos OS | Junos OS versions 14.1X53, 15.1, 15.1X53 sur EX Virtual Chassis Platforms, MX Virtual Chassis Platforms et QFX Virtual Chassis Platforms | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46, 12.3, 12.3X48, 14.1X53, 15.1, 15.1F, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.2X75, 17.3, 17.4, 18.1, 18.2 et 18.2X75 | ||
| N/A | N/A | Juniper ATP | ||
| Juniper Networks | Junos OS | Junos OS versions 15.1X53, 18.1, 18.2 sur EX2300 et EX3400 series | ||
| Juniper Networks | Junos OS | Junos OS versions 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2 sur MX Series | ||
| Juniper Networks | Junos OS | Junos OS versions 12.3X48, 15.1X49, 17.3, 17.4, 18.1 et 18.2 sur SRX Series | ||
| Juniper Networks | Junos Space | Junos Space | ||
| Juniper Networks | Junos OS | Junos OS versions 12.1X46, 12.3X48, 15.1X49 sur SRX Series | ||
| Juniper Networks | Junos OS | Tous produits et toutes plateformes exécutant Junos OS | ||
| Juniper Networks | Junos OS | Junos OS versions 17.2X75, 17.4, 18.1 et 18.2 sur QFX et PTX Series |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SRC Series Application Server et Web Administrator versions ant\u00e9rieures \u00e0 4.12.0-R1",
"product": {
"name": "Web",
"vendor": {
"name": "Centreon",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1 sur vMX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53, 15.1, 15.1X53, 16.1, 17.1, 17.2, 17.3, 17.4, 18.1 sur EX2300/EX3400, EX2300/EX3400 series, EX4600, QFX3K series, QFX5200/QFX5110 series et QFX5k series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 14.1X53, 15.1, 15.1X53 sur EX Virtual Chassis Platforms, MX Virtual Chassis Platforms et QFX Virtual Chassis Platforms",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46, 12.3, 12.3X48, 14.1X53, 15.1, 15.1F, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.2X75, 17.3, 17.4, 18.1, 18.2 et 18.2X75",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper ATP",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Junos OS versions 15.1X53, 18.1, 18.2 sur EX2300 et EX3400 series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2 sur MX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.3X48, 15.1X49, 17.3, 17.4, 18.1 et 18.2 sur SRX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 12.1X46, 12.3X48, 15.1X49 sur SRX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Tous produits et toutes plateformes ex\u00e9cutant Junos OS",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions 17.2X75, 17.4, 18.1 et 18.2 sur QFX et PTX Series",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-0010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0010"
},
{
"name": "CVE-2018-10901",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10901"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2019-0003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0003"
},
{
"name": "CVE-2019-0007",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0007"
},
{
"name": "CVE-2018-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5391"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2017-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0861"
},
{
"name": "CVE-2018-7566",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7566"
},
{
"name": "CVE-2019-0027",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0027"
},
{
"name": "CVE-2019-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0030"
},
{
"name": "CVE-2017-1000379",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000379"
},
{
"name": "CVE-2019-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0001"
},
{
"name": "CVE-2018-14634",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14634"
},
{
"name": "CVE-2019-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0002"
},
{
"name": "CVE-2019-0013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0013"
},
{
"name": "CVE-2019-0023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0023"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2018-10675",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10675"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2017-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3137"
},
{
"name": "CVE-2015-1283",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1283"
},
{
"name": "CVE-2016-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3705"
},
{
"name": "CVE-2017-3142",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3142"
},
{
"name": "CVE-2018-10872",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10872"
},
{
"name": "CVE-2019-0015",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0015"
},
{
"name": "CVE-2019-0005",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0005"
},
{
"name": "CVE-2019-0009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0009"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2019-0024",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0024"
},
{
"name": "CVE-2019-0025",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0025"
},
{
"name": "CVE-2017-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3143"
},
{
"name": "CVE-2018-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3620"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2019-0011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0011"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2017-15265",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15265"
},
{
"name": "CVE-2019-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0012"
},
{
"name": "CVE-2017-11610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11610"
},
{
"name": "CVE-2018-5748",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5748"
},
{
"name": "CVE-2019-0004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0004"
},
{
"name": "CVE-2019-0017",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0017"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3665"
},
{
"name": "CVE-2017-1000366",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000366"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2018-12020",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12020"
},
{
"name": "CVE-2018-5390",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5390"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2019-0021",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0021"
},
{
"name": "CVE-2018-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9251"
},
{
"name": "CVE-2019-0016",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0016"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-8897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8897"
},
{
"name": "CVE-2019-0022",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0022"
},
{
"name": "CVE-2017-1000364",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000364"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-1050",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1050"
},
{
"name": "CVE-2019-0014",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0014"
},
{
"name": "CVE-2018-3693",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3693"
},
{
"name": "CVE-2018-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10911"
},
{
"name": "CVE-2019-0026",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0026"
},
{
"name": "CVE-2019-0029",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0029"
},
{
"name": "CVE-2019-0020",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0020"
},
{
"name": "CVE-2018-5740",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5740"
},
{
"name": "CVE-2017-2619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2619"
},
{
"name": "CVE-2019-0018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0018"
},
{
"name": "CVE-2018-1000004",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004"
},
{
"name": "CVE-2019-0006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0006"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2017-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3136"
},
{
"name": "CVE-2011-3389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3389"
},
{
"name": "CVE-2017-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3145"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-10301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10301"
}
],
"initial_release_date": "2019-01-10T00:00:00",
"last_revision_date": "2019-01-10T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-014",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-01-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10906 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10906\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10910 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10910\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10911 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10911\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10907 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10907\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10912 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10912\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10913 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10913\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10919 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10919\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10905 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10905\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10902 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10902\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10917 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10917\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10904 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10904\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10915 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10915\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10916 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10916\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10914 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10914\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10900 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10900\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10909 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10909\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10901 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10901\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10918 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10918\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10903 du 9 janvier 2019",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10903\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
VAR-201706-0334
Vulnerability from variot - Updated: 2025-12-22 22:38glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier. glibc Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. GNU glibc is prone to local memory-corruption vulnerability. An attacker could exploit this issue to execute arbitrary code in the context of the application. GNU glibc 2.25 and prior versions are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: glibc security update Advisory ID: RHSA-2017:1479-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:1479 Issue date: 2017-06-19 CVE Names: CVE-2017-1000366 =====================================================================
- Summary:
An update for glibc is now available for Red Hat Enterprise Linux 5 Extended Lifecycle Support, Red Hat Enterprise Linux 5.9 Long Life, Red Hat Enterprise Linux 6.2 Advanced Update Support, Red Hat Enterprise Linux 6.4 Advanced Update Support, Red Hat Enterprise Linux 6.5 Advanced Update Support, Red Hat Enterprise Linux 6.5 Telco Extended Update Support, Red Hat Enterprise Linux 6.6 Advanced Update Support, Red Hat Enterprise Linux 6.6 Telco Extended Update Support, Red Hat Enterprise Linux 6.7 Extended Update Support, and Red Hat Enterprise Linux 7.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux ComputeNode EUS (v. 7.2) - x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2) - x86_64 Red Hat Enterprise Linux HPC Node EUS (v. 6.7) - x86_64 Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7) - x86_64 Red Hat Enterprise Linux Long Life (v. 5.9 server) - i386, ia64, x86_64 Red Hat Enterprise Linux Server (v. 5 ELS) - i386, s390x, x86_64 Red Hat Enterprise Linux Server AUS (v. 6.2) - x86_64 Red Hat Enterprise Linux Server AUS (v. 6.4) - x86_64 Red Hat Enterprise Linux Server AUS (v. 6.5) - x86_64 Red Hat Enterprise Linux Server AUS (v. 6.6) - x86_64 Red Hat Enterprise Linux Server EUS (v. 6.7) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server EUS (v. 7.2) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.2) - x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.4) - x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.5) - x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.6) - x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 6.7) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.2) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 6.5) - x86_64 Red Hat Enterprise Linux Server Optional TUS (v. 6.6) - x86_64 Red Hat Enterprise Linux Server TUS (v. 6.5) - x86_64 Red Hat Enterprise Linux Server TUS (v. 6.6) - x86_64
- Description:
The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366)
Red Hat would like to thank Qualys Research Labs for reporting this issue.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
For the update to take effect, all services linked to the glibc library must be restarted, or the system rebooted.
- Bugs fixed (https://bugzilla.redhat.com/):
1452543 - CVE-2017-1000366 glibc: heap/stack gap jumping via unbounded stack allocations
- Package List:
Red Hat Enterprise Linux Long Life (v. 5.9 server):
Source: glibc-2.5-107.el5_9.9.src.rpm
i386: glibc-2.5-107.el5_9.9.i386.rpm glibc-2.5-107.el5_9.9.i686.rpm glibc-common-2.5-107.el5_9.9.i386.rpm glibc-debuginfo-2.5-107.el5_9.9.i386.rpm glibc-debuginfo-2.5-107.el5_9.9.i686.rpm glibc-debuginfo-common-2.5-107.el5_9.9.i386.rpm glibc-devel-2.5-107.el5_9.9.i386.rpm glibc-headers-2.5-107.el5_9.9.i386.rpm glibc-utils-2.5-107.el5_9.9.i386.rpm nscd-2.5-107.el5_9.9.i386.rpm
ia64: glibc-2.5-107.el5_9.9.i686.rpm glibc-2.5-107.el5_9.9.ia64.rpm glibc-common-2.5-107.el5_9.9.ia64.rpm glibc-debuginfo-2.5-107.el5_9.9.i686.rpm glibc-debuginfo-2.5-107.el5_9.9.ia64.rpm glibc-debuginfo-common-2.5-107.el5_9.9.i386.rpm glibc-devel-2.5-107.el5_9.9.ia64.rpm glibc-headers-2.5-107.el5_9.9.ia64.rpm glibc-utils-2.5-107.el5_9.9.ia64.rpm nscd-2.5-107.el5_9.9.ia64.rpm
x86_64: glibc-2.5-107.el5_9.9.i686.rpm glibc-2.5-107.el5_9.9.x86_64.rpm glibc-common-2.5-107.el5_9.9.x86_64.rpm glibc-debuginfo-2.5-107.el5_9.9.i386.rpm glibc-debuginfo-2.5-107.el5_9.9.i686.rpm glibc-debuginfo-2.5-107.el5_9.9.x86_64.rpm glibc-debuginfo-common-2.5-107.el5_9.9.i386.rpm glibc-devel-2.5-107.el5_9.9.i386.rpm glibc-devel-2.5-107.el5_9.9.x86_64.rpm glibc-headers-2.5-107.el5_9.9.x86_64.rpm glibc-utils-2.5-107.el5_9.9.x86_64.rpm nscd-2.5-107.el5_9.9.x86_64.rpm
Red Hat Enterprise Linux Server (v. 5 ELS):
Source: glibc-2.5-123.el5_11.4.src.rpm
i386: glibc-2.5-123.el5_11.4.i386.rpm glibc-2.5-123.el5_11.4.i686.rpm glibc-common-2.5-123.el5_11.4.i386.rpm glibc-debuginfo-2.5-123.el5_11.4.i386.rpm glibc-debuginfo-2.5-123.el5_11.4.i686.rpm glibc-debuginfo-common-2.5-123.el5_11.4.i386.rpm glibc-devel-2.5-123.el5_11.4.i386.rpm glibc-headers-2.5-123.el5_11.4.i386.rpm glibc-utils-2.5-123.el5_11.4.i386.rpm nscd-2.5-123.el5_11.4.i386.rpm
s390x: glibc-2.5-123.el5_11.4.s390.rpm glibc-2.5-123.el5_11.4.s390x.rpm glibc-common-2.5-123.el5_11.4.s390x.rpm glibc-debuginfo-2.5-123.el5_11.4.s390.rpm glibc-debuginfo-2.5-123.el5_11.4.s390x.rpm glibc-devel-2.5-123.el5_11.4.s390.rpm glibc-devel-2.5-123.el5_11.4.s390x.rpm glibc-headers-2.5-123.el5_11.4.s390x.rpm glibc-utils-2.5-123.el5_11.4.s390x.rpm nscd-2.5-123.el5_11.4.s390x.rpm
x86_64: glibc-2.5-123.el5_11.4.i686.rpm glibc-2.5-123.el5_11.4.x86_64.rpm glibc-common-2.5-123.el5_11.4.x86_64.rpm glibc-debuginfo-2.5-123.el5_11.4.i386.rpm glibc-debuginfo-2.5-123.el5_11.4.i686.rpm glibc-debuginfo-2.5-123.el5_11.4.x86_64.rpm glibc-debuginfo-common-2.5-123.el5_11.4.i386.rpm glibc-devel-2.5-123.el5_11.4.i386.rpm glibc-devel-2.5-123.el5_11.4.x86_64.rpm glibc-headers-2.5-123.el5_11.4.x86_64.rpm glibc-utils-2.5-123.el5_11.4.x86_64.rpm nscd-2.5-123.el5_11.4.x86_64.rpm
Red Hat Enterprise Linux HPC Node EUS (v. 6.7):
Source: glibc-2.12-1.166.el6_7.8.src.rpm
x86_64: glibc-2.12-1.166.el6_7.8.i686.rpm glibc-2.12-1.166.el6_7.8.x86_64.rpm glibc-common-2.12-1.166.el6_7.8.x86_64.rpm glibc-debuginfo-2.12-1.166.el6_7.8.i686.rpm glibc-debuginfo-2.12-1.166.el6_7.8.x86_64.rpm glibc-debuginfo-common-2.12-1.166.el6_7.8.i686.rpm glibc-debuginfo-common-2.12-1.166.el6_7.8.x86_64.rpm glibc-devel-2.12-1.166.el6_7.8.i686.rpm glibc-devel-2.12-1.166.el6_7.8.x86_64.rpm glibc-headers-2.12-1.166.el6_7.8.x86_64.rpm glibc-utils-2.12-1.166.el6_7.8.x86_64.rpm nscd-2.12-1.166.el6_7.8.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7):
x86_64: glibc-debuginfo-2.12-1.166.el6_7.8.i686.rpm glibc-debuginfo-2.12-1.166.el6_7.8.x86_64.rpm glibc-debuginfo-common-2.12-1.166.el6_7.8.i686.rpm glibc-debuginfo-common-2.12-1.166.el6_7.8.x86_64.rpm glibc-static-2.12-1.166.el6_7.8.i686.rpm glibc-static-2.12-1.166.el6_7.8.x86_64.rpm
Red Hat Enterprise Linux Server AUS (v. 6.2):
Source: glibc-2.12-1.47.el6_2.18.src.rpm
x86_64: glibc-2.12-1.47.el6_2.18.i686.rpm glibc-2.12-1.47.el6_2.18.x86_64.rpm glibc-common-2.12-1.47.el6_2.18.x86_64.rpm glibc-debuginfo-2.12-1.47.el6_2.18.i686.rpm glibc-debuginfo-2.12-1.47.el6_2.18.x86_64.rpm glibc-debuginfo-common-2.12-1.47.el6_2.18.i686.rpm glibc-debuginfo-common-2.12-1.47.el6_2.18.x86_64.rpm glibc-devel-2.12-1.47.el6_2.18.i686.rpm glibc-devel-2.12-1.47.el6_2.18.x86_64.rpm glibc-headers-2.12-1.47.el6_2.18.x86_64.rpm glibc-utils-2.12-1.47.el6_2.18.x86_64.rpm nscd-2.12-1.47.el6_2.18.x86_64.rpm
Red Hat Enterprise Linux Server AUS (v. 6.4):
Source: glibc-2.12-1.107.el6_4.10.src.rpm
x86_64: glibc-2.12-1.107.el6_4.10.i686.rpm glibc-2.12-1.107.el6_4.10.x86_64.rpm glibc-common-2.12-1.107.el6_4.10.x86_64.rpm glibc-debuginfo-2.12-1.107.el6_4.10.i686.rpm glibc-debuginfo-2.12-1.107.el6_4.10.x86_64.rpm glibc-debuginfo-common-2.12-1.107.el6_4.10.i686.rpm glibc-debuginfo-common-2.12-1.107.el6_4.10.x86_64.rpm glibc-devel-2.12-1.107.el6_4.10.i686.rpm glibc-devel-2.12-1.107.el6_4.10.x86_64.rpm glibc-headers-2.12-1.107.el6_4.10.x86_64.rpm glibc-utils-2.12-1.107.el6_4.10.x86_64.rpm nscd-2.12-1.107.el6_4.10.x86_64.rpm
Red Hat Enterprise Linux Server AUS (v. 6.5):
Source: glibc-2.12-1.132.el6_5.9.src.rpm
x86_64: glibc-2.12-1.132.el6_5.9.i686.rpm glibc-2.12-1.132.el6_5.9.x86_64.rpm glibc-common-2.12-1.132.el6_5.9.x86_64.rpm glibc-debuginfo-2.12-1.132.el6_5.9.i686.rpm glibc-debuginfo-2.12-1.132.el6_5.9.x86_64.rpm glibc-debuginfo-common-2.12-1.132.el6_5.9.i686.rpm glibc-debuginfo-common-2.12-1.132.el6_5.9.x86_64.rpm glibc-devel-2.12-1.132.el6_5.9.i686.rpm glibc-devel-2.12-1.132.el6_5.9.x86_64.rpm glibc-headers-2.12-1.132.el6_5.9.x86_64.rpm glibc-utils-2.12-1.132.el6_5.9.x86_64.rpm nscd-2.12-1.132.el6_5.9.x86_64.rpm
Red Hat Enterprise Linux Server TUS (v. 6.5):
Source: glibc-2.12-1.132.el6_5.9.src.rpm
x86_64: glibc-2.12-1.132.el6_5.9.i686.rpm glibc-2.12-1.132.el6_5.9.x86_64.rpm glibc-common-2.12-1.132.el6_5.9.x86_64.rpm glibc-debuginfo-2.12-1.132.el6_5.9.i686.rpm glibc-debuginfo-2.12-1.132.el6_5.9.x86_64.rpm glibc-debuginfo-common-2.12-1.132.el6_5.9.i686.rpm glibc-debuginfo-common-2.12-1.132.el6_5.9.x86_64.rpm glibc-devel-2.12-1.132.el6_5.9.i686.rpm glibc-devel-2.12-1.132.el6_5.9.x86_64.rpm glibc-headers-2.12-1.132.el6_5.9.x86_64.rpm glibc-utils-2.12-1.132.el6_5.9.x86_64.rpm nscd-2.12-1.132.el6_5.9.x86_64.rpm
Red Hat Enterprise Linux Server AUS (v. 6.6):
Source: glibc-2.12-1.149.el6_6.12.src.rpm
x86_64: glibc-2.12-1.149.el6_6.12.i686.rpm glibc-2.12-1.149.el6_6.12.x86_64.rpm glibc-common-2.12-1.149.el6_6.12.x86_64.rpm glibc-debuginfo-2.12-1.149.el6_6.12.i686.rpm glibc-debuginfo-2.12-1.149.el6_6.12.x86_64.rpm glibc-debuginfo-common-2.12-1.149.el6_6.12.i686.rpm glibc-debuginfo-common-2.12-1.149.el6_6.12.x86_64.rpm glibc-devel-2.12-1.149.el6_6.12.i686.rpm glibc-devel-2.12-1.149.el6_6.12.x86_64.rpm glibc-headers-2.12-1.149.el6_6.12.x86_64.rpm glibc-utils-2.12-1.149.el6_6.12.x86_64.rpm nscd-2.12-1.149.el6_6.12.x86_64.rpm
Red Hat Enterprise Linux Server TUS (v. 6.6):
Source: glibc-2.12-1.149.el6_6.12.src.rpm
x86_64: glibc-2.12-1.149.el6_6.12.i686.rpm glibc-2.12-1.149.el6_6.12.x86_64.rpm glibc-common-2.12-1.149.el6_6.12.x86_64.rpm glibc-debuginfo-2.12-1.149.el6_6.12.i686.rpm glibc-debuginfo-2.12-1.149.el6_6.12.x86_64.rpm glibc-debuginfo-common-2.12-1.149.el6_6.12.i686.rpm glibc-debuginfo-common-2.12-1.149.el6_6.12.x86_64.rpm glibc-devel-2.12-1.149.el6_6.12.i686.rpm glibc-devel-2.12-1.149.el6_6.12.x86_64.rpm glibc-headers-2.12-1.149.el6_6.12.x86_64.rpm glibc-utils-2.12-1.149.el6_6.12.x86_64.rpm nscd-2.12-1.149.el6_6.12.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 6.7):
Source: glibc-2.12-1.166.el6_7.8.src.rpm
i386: glibc-2.12-1.166.el6_7.8.i686.rpm glibc-common-2.12-1.166.el6_7.8.i686.rpm glibc-debuginfo-2.12-1.166.el6_7.8.i686.rpm glibc-debuginfo-common-2.12-1.166.el6_7.8.i686.rpm glibc-devel-2.12-1.166.el6_7.8.i686.rpm glibc-headers-2.12-1.166.el6_7.8.i686.rpm glibc-utils-2.12-1.166.el6_7.8.i686.rpm nscd-2.12-1.166.el6_7.8.i686.rpm
ppc64: glibc-2.12-1.166.el6_7.8.ppc.rpm glibc-2.12-1.166.el6_7.8.ppc64.rpm glibc-common-2.12-1.166.el6_7.8.ppc64.rpm glibc-debuginfo-2.12-1.166.el6_7.8.ppc.rpm glibc-debuginfo-2.12-1.166.el6_7.8.ppc64.rpm glibc-debuginfo-common-2.12-1.166.el6_7.8.ppc.rpm glibc-debuginfo-common-2.12-1.166.el6_7.8.ppc64.rpm glibc-devel-2.12-1.166.el6_7.8.ppc.rpm glibc-devel-2.12-1.166.el6_7.8.ppc64.rpm glibc-headers-2.12-1.166.el6_7.8.ppc64.rpm glibc-utils-2.12-1.166.el6_7.8.ppc64.rpm nscd-2.12-1.166.el6_7.8.ppc64.rpm
s390x: glibc-2.12-1.166.el6_7.8.s390.rpm glibc-2.12-1.166.el6_7.8.s390x.rpm glibc-common-2.12-1.166.el6_7.8.s390x.rpm glibc-debuginfo-2.12-1.166.el6_7.8.s390.rpm glibc-debuginfo-2.12-1.166.el6_7.8.s390x.rpm glibc-debuginfo-common-2.12-1.166.el6_7.8.s390.rpm glibc-debuginfo-common-2.12-1.166.el6_7.8.s390x.rpm glibc-devel-2.12-1.166.el6_7.8.s390.rpm glibc-devel-2.12-1.166.el6_7.8.s390x.rpm glibc-headers-2.12-1.166.el6_7.8.s390x.rpm glibc-utils-2.12-1.166.el6_7.8.s390x.rpm nscd-2.12-1.166.el6_7.8.s390x.rpm
x86_64: glibc-2.12-1.166.el6_7.8.i686.rpm glibc-2.12-1.166.el6_7.8.x86_64.rpm glibc-common-2.12-1.166.el6_7.8.x86_64.rpm glibc-debuginfo-2.12-1.166.el6_7.8.i686.rpm glibc-debuginfo-2.12-1.166.el6_7.8.x86_64.rpm glibc-debuginfo-common-2.12-1.166.el6_7.8.i686.rpm glibc-debuginfo-common-2.12-1.166.el6_7.8.x86_64.rpm glibc-devel-2.12-1.166.el6_7.8.i686.rpm glibc-devel-2.12-1.166.el6_7.8.x86_64.rpm glibc-headers-2.12-1.166.el6_7.8.x86_64.rpm glibc-utils-2.12-1.166.el6_7.8.x86_64.rpm nscd-2.12-1.166.el6_7.8.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 6.2):
Source: glibc-2.12-1.47.el6_2.18.src.rpm
x86_64: glibc-debuginfo-2.12-1.47.el6_2.18.i686.rpm glibc-debuginfo-2.12-1.47.el6_2.18.x86_64.rpm glibc-debuginfo-common-2.12-1.47.el6_2.18.i686.rpm glibc-debuginfo-common-2.12-1.47.el6_2.18.x86_64.rpm glibc-static-2.12-1.47.el6_2.18.i686.rpm glibc-static-2.12-1.47.el6_2.18.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 6.4):
Source: glibc-2.12-1.107.el6_4.10.src.rpm
x86_64: glibc-debuginfo-2.12-1.107.el6_4.10.i686.rpm glibc-debuginfo-2.12-1.107.el6_4.10.x86_64.rpm glibc-debuginfo-common-2.12-1.107.el6_4.10.i686.rpm glibc-debuginfo-common-2.12-1.107.el6_4.10.x86_64.rpm glibc-static-2.12-1.107.el6_4.10.i686.rpm glibc-static-2.12-1.107.el6_4.10.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 6.5):
Source: glibc-2.12-1.132.el6_5.9.src.rpm
x86_64: glibc-debuginfo-2.12-1.132.el6_5.9.i686.rpm glibc-debuginfo-2.12-1.132.el6_5.9.x86_64.rpm glibc-debuginfo-common-2.12-1.132.el6_5.9.i686.rpm glibc-debuginfo-common-2.12-1.132.el6_5.9.x86_64.rpm glibc-static-2.12-1.132.el6_5.9.i686.rpm glibc-static-2.12-1.132.el6_5.9.x86_64.rpm
Red Hat Enterprise Linux Server Optional TUS (v. 6.5):
Source: glibc-2.12-1.132.el6_5.9.src.rpm
x86_64: glibc-debuginfo-2.12-1.132.el6_5.9.i686.rpm glibc-debuginfo-2.12-1.132.el6_5.9.x86_64.rpm glibc-debuginfo-common-2.12-1.132.el6_5.9.i686.rpm glibc-debuginfo-common-2.12-1.132.el6_5.9.x86_64.rpm glibc-static-2.12-1.132.el6_5.9.i686.rpm glibc-static-2.12-1.132.el6_5.9.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 6.6):
x86_64: glibc-debuginfo-2.12-1.149.el6_6.12.i686.rpm glibc-debuginfo-2.12-1.149.el6_6.12.x86_64.rpm glibc-debuginfo-common-2.12-1.149.el6_6.12.i686.rpm glibc-debuginfo-common-2.12-1.149.el6_6.12.x86_64.rpm glibc-static-2.12-1.149.el6_6.12.i686.rpm glibc-static-2.12-1.149.el6_6.12.x86_64.rpm
Red Hat Enterprise Linux Server Optional TUS (v. 6.6):
x86_64: glibc-debuginfo-2.12-1.149.el6_6.12.i686.rpm glibc-debuginfo-2.12-1.149.el6_6.12.x86_64.rpm glibc-debuginfo-common-2.12-1.149.el6_6.12.i686.rpm glibc-debuginfo-common-2.12-1.149.el6_6.12.x86_64.rpm glibc-static-2.12-1.149.el6_6.12.i686.rpm glibc-static-2.12-1.149.el6_6.12.x86_64.rpm
Red Hat Enterprise Linux Server Optional EUS (v. 6.7):
i386: glibc-debuginfo-2.12-1.166.el6_7.8.i686.rpm glibc-debuginfo-common-2.12-1.166.el6_7.8.i686.rpm glibc-static-2.12-1.166.el6_7.8.i686.rpm
ppc64: glibc-debuginfo-2.12-1.166.el6_7.8.ppc.rpm glibc-debuginfo-2.12-1.166.el6_7.8.ppc64.rpm glibc-debuginfo-common-2.12-1.166.el6_7.8.ppc.rpm glibc-debuginfo-common-2.12-1.166.el6_7.8.ppc64.rpm glibc-static-2.12-1.166.el6_7.8.ppc.rpm glibc-static-2.12-1.166.el6_7.8.ppc64.rpm
s390x: glibc-debuginfo-2.12-1.166.el6_7.8.s390.rpm glibc-debuginfo-2.12-1.166.el6_7.8.s390x.rpm glibc-debuginfo-common-2.12-1.166.el6_7.8.s390.rpm glibc-debuginfo-common-2.12-1.166.el6_7.8.s390x.rpm glibc-static-2.12-1.166.el6_7.8.s390.rpm glibc-static-2.12-1.166.el6_7.8.s390x.rpm
x86_64: glibc-debuginfo-2.12-1.166.el6_7.8.i686.rpm glibc-debuginfo-2.12-1.166.el6_7.8.x86_64.rpm glibc-debuginfo-common-2.12-1.166.el6_7.8.i686.rpm glibc-debuginfo-common-2.12-1.166.el6_7.8.x86_64.rpm glibc-static-2.12-1.166.el6_7.8.i686.rpm glibc-static-2.12-1.166.el6_7.8.x86_64.rpm
Red Hat Enterprise Linux ComputeNode EUS (v. 7.2):
Source: glibc-2.17-106.el7_2.9.src.rpm
x86_64: glibc-2.17-106.el7_2.9.i686.rpm glibc-2.17-106.el7_2.9.x86_64.rpm glibc-common-2.17-106.el7_2.9.x86_64.rpm glibc-debuginfo-2.17-106.el7_2.9.i686.rpm glibc-debuginfo-2.17-106.el7_2.9.x86_64.rpm glibc-debuginfo-common-2.17-106.el7_2.9.i686.rpm glibc-debuginfo-common-2.17-106.el7_2.9.x86_64.rpm glibc-devel-2.17-106.el7_2.9.i686.rpm glibc-devel-2.17-106.el7_2.9.x86_64.rpm glibc-headers-2.17-106.el7_2.9.x86_64.rpm glibc-utils-2.17-106.el7_2.9.x86_64.rpm nscd-2.17-106.el7_2.9.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2):
x86_64: glibc-debuginfo-2.17-106.el7_2.9.i686.rpm glibc-debuginfo-2.17-106.el7_2.9.x86_64.rpm glibc-debuginfo-common-2.17-106.el7_2.9.i686.rpm glibc-debuginfo-common-2.17-106.el7_2.9.x86_64.rpm glibc-static-2.17-106.el7_2.9.i686.rpm glibc-static-2.17-106.el7_2.9.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 7.2):
Source: glibc-2.17-106.el7_2.9.src.rpm
ppc64: glibc-2.17-106.el7_2.9.ppc.rpm glibc-2.17-106.el7_2.9.ppc64.rpm glibc-common-2.17-106.el7_2.9.ppc64.rpm glibc-debuginfo-2.17-106.el7_2.9.ppc.rpm glibc-debuginfo-2.17-106.el7_2.9.ppc64.rpm glibc-debuginfo-common-2.17-106.el7_2.9.ppc.rpm glibc-debuginfo-common-2.17-106.el7_2.9.ppc64.rpm glibc-devel-2.17-106.el7_2.9.ppc.rpm glibc-devel-2.17-106.el7_2.9.ppc64.rpm glibc-headers-2.17-106.el7_2.9.ppc64.rpm glibc-utils-2.17-106.el7_2.9.ppc64.rpm nscd-2.17-106.el7_2.9.ppc64.rpm
ppc64le: glibc-2.17-106.el7_2.9.ppc64le.rpm glibc-common-2.17-106.el7_2.9.ppc64le.rpm glibc-debuginfo-2.17-106.el7_2.9.ppc64le.rpm glibc-debuginfo-common-2.17-106.el7_2.9.ppc64le.rpm glibc-devel-2.17-106.el7_2.9.ppc64le.rpm glibc-headers-2.17-106.el7_2.9.ppc64le.rpm glibc-utils-2.17-106.el7_2.9.ppc64le.rpm nscd-2.17-106.el7_2.9.ppc64le.rpm
s390x: glibc-2.17-106.el7_2.9.s390.rpm glibc-2.17-106.el7_2.9.s390x.rpm glibc-common-2.17-106.el7_2.9.s390x.rpm glibc-debuginfo-2.17-106.el7_2.9.s390.rpm glibc-debuginfo-2.17-106.el7_2.9.s390x.rpm glibc-debuginfo-common-2.17-106.el7_2.9.s390.rpm glibc-debuginfo-common-2.17-106.el7_2.9.s390x.rpm glibc-devel-2.17-106.el7_2.9.s390.rpm glibc-devel-2.17-106.el7_2.9.s390x.rpm glibc-headers-2.17-106.el7_2.9.s390x.rpm glibc-utils-2.17-106.el7_2.9.s390x.rpm nscd-2.17-106.el7_2.9.s390x.rpm
x86_64: glibc-2.17-106.el7_2.9.i686.rpm glibc-2.17-106.el7_2.9.x86_64.rpm glibc-common-2.17-106.el7_2.9.x86_64.rpm glibc-debuginfo-2.17-106.el7_2.9.i686.rpm glibc-debuginfo-2.17-106.el7_2.9.x86_64.rpm glibc-debuginfo-common-2.17-106.el7_2.9.i686.rpm glibc-debuginfo-common-2.17-106.el7_2.9.x86_64.rpm glibc-devel-2.17-106.el7_2.9.i686.rpm glibc-devel-2.17-106.el7_2.9.x86_64.rpm glibc-headers-2.17-106.el7_2.9.x86_64.rpm glibc-utils-2.17-106.el7_2.9.x86_64.rpm nscd-2.17-106.el7_2.9.x86_64.rpm
Red Hat Enterprise Linux Server Optional EUS (v. 7.2):
ppc64: glibc-debuginfo-2.17-106.el7_2.9.ppc.rpm glibc-debuginfo-2.17-106.el7_2.9.ppc64.rpm glibc-debuginfo-common-2.17-106.el7_2.9.ppc.rpm glibc-debuginfo-common-2.17-106.el7_2.9.ppc64.rpm glibc-static-2.17-106.el7_2.9.ppc.rpm glibc-static-2.17-106.el7_2.9.ppc64.rpm
ppc64le: glibc-debuginfo-2.17-106.el7_2.9.ppc64le.rpm glibc-debuginfo-common-2.17-106.el7_2.9.ppc64le.rpm glibc-static-2.17-106.el7_2.9.ppc64le.rpm
s390x: glibc-debuginfo-2.17-106.el7_2.9.s390.rpm glibc-debuginfo-2.17-106.el7_2.9.s390x.rpm glibc-debuginfo-common-2.17-106.el7_2.9.s390.rpm glibc-debuginfo-common-2.17-106.el7_2.9.s390x.rpm glibc-static-2.17-106.el7_2.9.s390.rpm glibc-static-2.17-106.el7_2.9.s390x.rpm
x86_64: glibc-debuginfo-2.17-106.el7_2.9.i686.rpm glibc-debuginfo-2.17-106.el7_2.9.x86_64.rpm glibc-debuginfo-common-2.17-106.el7_2.9.i686.rpm glibc-debuginfo-common-2.17-106.el7_2.9.x86_64.rpm glibc-static-2.17-106.el7_2.9.i686.rpm glibc-static-2.17-106.el7_2.9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2017-1000366 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/stackguard
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFZSDV3XlSAg2UNWIIRAibeAKC2QtxViqngTTBVM9fvG1XjRCkgwACgrHP1 PVr1sUH9RUhxrQOKQqWtnKY= =ywUB -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . For the full details, please refer to their advisory published at: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
For the oldstable distribution (jessie), this problem has been fixed in version 2.19-18+deb8u10.
For the stable distribution (stretch), this problem has been fixed in version 2.24-11+deb9u1.
For the unstable distribution (sid), this problem will be fixed soon.
We recommend that you upgrade your glibc packages. Qualys Security Advisory
The Stack Clash
======================================================================== Contents ========================================================================
I. Introduction II. Problem II.1. Automatic stack expansion II.2. Stack guard-page II.3. Stack-clash exploitation III. Solutions IV. Results IV.1. Linux IV.2. OpenBSD IV.3. NetBSD IV.4. FreeBSD IV.5. Solaris V. Acknowledgments
======================================================================== I. Introduction ========================================================================
Our research started with a 96-megabyte surprise:
b97bb000-b97dc000 rw-p 00000000 00:00 0 [heap] bf7c6000-bf806000 rw-p 00000000 00:00 0 [stack]
and a 12-year-old question: "If the heap grows up, and the stack grows down, what happens when they clash? Is it exploitable? How?"
- In 2005, Gael Delalleau presented "Large memory management vulnerabilities" and the first stack-clash exploit in user-space (against mod_php 4.3.0 on Apache 2.0.53):
http://cansecwest.com/core05/memory_vulns_delalleau.pdf
- In 2010, Rafal Wojtczuk published "Exploiting large memory management vulnerabilities in Xorg server running on Linux", the second stack-clash exploit in user-space (CVE-2010-2240):
http://www.invisiblethingslab.com/resources/misc-2010/xorg-large-memory-attacks.pdf
- Since 2010, security researchers have exploited several stack-clashes in the kernel-space; for example:
https://jon.oberheide.org/blog/2010/11/29/exploiting-stack-overflows-in-the-linux-kernel/ https://jon.oberheide.org/files/infiltrate12-thestackisback.pdf https://googleprojectzero.blogspot.com/2016/06/exploiting-recursion-in-linux-kernel_20.html
In user-space, however, this problem has been greatly underestimated; the only public exploits are Gael Delalleau's and Rafal Wojtczuk's, and they were written before Linux introduced a protection against stack-clashes (a "guard-page" mapped below the stack):
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2240
In this advisory, we show that stack-clashes are widespread in user-space, and exploitable despite the stack guard-page; we discovered multiple vulnerabilities in guard-page implementations, and devised general methods for:
-
"Clashing" the stack with another memory region: we allocate memory until the stack reaches another memory region, or until another memory region reaches the stack;
-
"Jumping" over the stack guard-page: we move the stack-pointer from the stack and into the other memory region, without accessing the stack guard-page;
-
"Smashing" the stack, or the other memory region: we overwrite the stack with the other memory region, or the other memory region with the stack.
To illustrate our findings, we developed the following exploits and proofs-of-concepts:
-
a local-root exploit against Exim (CVE-2017-1000369, CVE-2017-1000376) on i386 Debian;
-
a local-root exploit against Sudo (CVE-2017-1000367, CVE-2017-1000366) on i386 Debian, Ubuntu, CentOS;
-
an independent Sudoer-to-root exploit against CVE-2017-1000367 on any SELinux-enabled distribution;
-
a local-root exploit against ld.so and most SUID-root binaries (CVE-2017-1000366, CVE-2017-1000370) on i386 Debian, Fedora, CentOS;
-
a local-root exploit against ld.so and most SUID-root PIEs (CVE-2017-1000366, CVE-2017-1000371) on i386 Debian, Ubuntu, Fedora;
-
a local-root exploit against /bin/su (CVE-2017-1000366, CVE-2017-1000365) on i386 Debian;
-
a proof-of-concept that gains eip control against Sudo on i386 grsecurity/PaX (CVE-2017-1000367, CVE-2017-1000366, CVE-2017-1000377);
-
a local proof-of-concept that gains rip control against Exim (CVE-2017-1000369) on amd64 Debian;
-
a local-root exploit against ld.so and most SUID-root binaries (CVE-2017-1000366, CVE-2017-1000379) on amd64 Debian, Ubuntu, Fedora, CentOS;
-
a proof-of-concept against /usr/bin/at on i386 OpenBSD, for CVE-2017-1000372 in OpenBSD's stack guard-page implementation and CVE-2017-1000373 in OpenBSD's qsort() function;
-
a proof-of-concept for CVE-2017-1000374 and CVE-2017-1000375 in NetBSD's stack guard-page implementation;
-
a proof-of-concept for CVE-2017-1085 in FreeBSD's setrlimit() RLIMIT_STACK implementation;
-
two proofs-of-concept for CVE-2017-1083 and CVE-2017-1084 in FreeBSD's stack guard-page implementation;
-
a local-root exploit against /usr/bin/rsh (CVE-2017-3630, CVE-2017-3629, CVE-2017-3631) on Solaris 11.
======================================================================== II. Problem ========================================================================
Note: in this advisory, the "start of the stack" is the lowest address of its memory region, and the "end of the stack" is the highest address of its memory region; we do not use the ambiguous terms "top of the stack" and "bottom of the stack".
======================================================================== II.1. Automatic stack expansion ========================================================================
The user-space stack of a process is automatically expanded by the kernel:
-
if the stack-pointer (the esp register, on i386) reaches the start of the stack and the unmapped memory pages below (the stack grows down, on i386),
-
then a "page-fault" exception is raised and caught by the kernel,
-
and the page-fault handler transparently expands the user-space stack of the process (it decreases the start address of the stack),
-
or it terminates the process with a SIGSEGV if the stack expansion fails (for example, if the RLIMIT_STACK is reached).
Unfortunately, this stack expansion mechanism is implicit and fragile: it relies on page-fault exceptions, but if another memory region is mapped directly below the stack, then the stack-pointer can move from the stack into the other memory region without raising a page-fault, and:
-
the kernel cannot tell that the process needed more stack memory;
-
the process cannot tell that its stack-pointer moved from the stack into another memory region.
In contrast, the heap expansion mechanism is explicit and robust: the process uses the brk() system-call to tell the kernel that it needs more heap memory, and the kernel expands the heap accordingly (it increases the end address of the heap memory region -- the heap always grows up).
======================================================================== II.2. Stack guard-page ========================================================================
The fragile stack expansion mechanism poses a security threat: if the stack-pointer of a process can move from the stack into another memory region (which ends exactly where the stack starts) without raising a page-fault, then:
-
the process uses this other memory region as if it were an extension of the stack;
-
a write to this stack extension smashes the other memory region;
-
a write to the other memory region smashes the stack extension.
To protect against this security threat, the kernel maps a "guard-page" below the start of the stack: one or more PROT_NONE pages (or unmappable pages) that:
-
raise a page-fault exception if accessed (before the stack-pointer can move from the stack into another memory region);
-
terminate the process with a SIGSEGV (because the page-fault handler cannot expand the stack if another memory region is mapped directly below).
Unfortunately, a stack guard-page of a few kilobytes is insufficient (CVE-2017-1000364): if the stack-pointer "jumps" over the guard-page -- if it moves from the stack into another memory region without accessing the guard-page -- then no page-fault exception is raised and the stack extends into the other memory region.
This theoretical vulnerability was first described in Gael Delalleau's 2005 presentation (slides 24-29). In the present advisory, we discuss its practicalities, and multiple vulnerabilities in stack guard-page implementations (in OpenBSD, NetBSD, and FreeBSD), but we exclude related vulnerabilities such as unbounded alloca()s and VLAs (Variable-Length Arrays) that have been exploited in the past:
http://phrack.org/issues/63/14.html http://blog.exodusintel.com/2013/01/07/who-was-phone/
======================================================================== II.3. Stack-clash exploitation ========================================================================
Must be a clash, there's no alternative.
--The Clash, "Kingston Advice"
Our exploits follow a series of four sequential steps -- each step allocates memory that must not be freed before all steps are complete:
Step 1: Clash (the stack with another memory region) Step 2: Run (move the stack-pointer to the start of the stack) Step 3: Jump (over the stack guard-page, into the other memory region) Step 4: Smash (the stack, or the other memory region)
======================================================================== II.3.1. Step 1: Clash the stack with another memory region ========================================================================
Have the boys found the leak yet?
--The Clash, "The Leader"
Allocate memory until the start of the stack reaches the end of another memory region, or until the end of another memory region reaches the start of the stack.
-
The other memory region can be, for example: . the heap; . an anonymous mmap(); . the read-write segment of ld.so; . the read-write segment of a PIE, a Position-Independent Executable.
-
The memory allocated in this Step 1 can be, for example: . stack and heap memory; . stack and anonymous mmap() memory; . stack memory only.
-
The heap and anonymous mmap() memory can be:
. temporarily allocated, but not freed before the stack guard-page is jumped over in Step 3 and memory is smashed in Step 4;
. permanently leaked. On Linux, a general method for allocating anonymous mmap()s is the LD_AUDIT memory leak that we discovered in the ld.so part of the glibc, the GNU C Library (CVE-2017-1000366).
- The stack memory can be allocated, for example:
. through megabytes of command-line arguments and environment variables.
On Linux, this general method for allocating stack memory is limited
by the kernel to 1/4 of the current RLIMIT_STACK (1GB on i386 if
RLIMIT_STACK is RLIM_INFINITY -- man execve, "Limits on size of
arguments and environment").
However, as we were drafting this advisory, we realized that the
kernel imposes this limit on the argument and environment strings,
but not on the argv[] and envp[] pointers to these strings, and we
developed alternative versions of our Linux exploits that do not
depend on application-specific memory leaks (CVE-2017-1000365). through recursive function calls.
On BSD, we discovered a general method for allocating megabytes of
stack memory: a vulnerability in qsort() that causes this function
to recurse N/4 times, given a pathological input array of N elements
(CVE-2017-1000373 in OpenBSD, CVE-2017-1000378 in NetBSD, and
CVE-2017-1082 in FreeBSD).
- In a few rare cases, Step 1 is not needed, because another memory region is naturally mapped directly below the stack (for example, ld.so in our Solaris exploit).
======================================================================== II.3.2. Step 2: Move the stack-pointer to the start of the stack ========================================================================
Run, run, run, run, run, don't you know?
--The Clash, "Three Card Trick"
Consume the unused stack memory that separates the stack-pointer from the start of the stack. This Step 2 is similar to Step 3 ("Jump over the stack guard-page") but is needed because:
- the stack-pointer is usually several kilobytes higher than the start of the stack (functions that allocate a large stack-frame decrease the start address of the stack, but this address is never increased again); moreover:
. the FreeBSD kernel automatically expands the user-space stack of a process by multiples of 128KB (SGROWSIZ, in vm_map_growstack());
. the Linux kernel initially expands the user-space stack of a process by 128KB (stack_expand, in setup_arg_pages()).
- in Step 3, the stack-based buffer used to jump over the guard-page:
. is usually not large enough to simultaneously move the stack-pointer to the start of the stack, and then into another memory region;
. must not be fully written to (a full write would access the stack guard-page and terminate the process) but the stack memory consumed in this Step 2 can be fully written to (for example, strdupa() can be used in Step 2, but not in Step 3).
The stack memory consumed in this Step 2 can be, for example:
-
large stack-frames, alloca()s, or VLAs (which can be detected by grsecurity/PaX's STACKLEAK plugin for GCC, https://grsecurity.net/features.php);
-
recursive function calls (which can be detected by GNU cflow, http://www.gnu.org/software/cflow/);
-
on Linux, we discovered that the argv[] and envp[] arrays of pointers can be used to consume the 128KB of initial stack expansion, because the kernel allocates these arrays on the stack long after the call to setup_arg_pages(); this general method for completing Step 2 is exploitable locally, but the initial stack expansion poses a major obstacle to the remote exploitation of stack-clashes, as mentioned in IV.1.1.
In a few rare cases, Step 2 is not needed, because the stack-pointer is naturally close to the start of the stack (for example, in Exim's main() function, the 256KB group_list[] moves the stack-pointer to the start of the stack and beyond).
======================================================================== II.3.3. Step 3: Jump over the stack guard-page, into another memory region ========================================================================
You need a little jump of electrical shockers.
--The Clash, "Clash City Rockers"
Move the stack-pointer from the stack and into the memory region that clashed with the stack in Step 1, but without accessing the guard-page. To complete this Step 3, a large stack-based buffer, alloca(), or VLA is needed, and:
-
it must be larger than the guard-page;
-
it must end in the stack, above the guard-page;
-
it must start in the memory region below the stack guard-page;
-
it must not be fully written to (a full write would access the guard-page, raise a page-fault exception, and terminate the process, because the memory region mapped directly below the stack prevents the page-fault handler from expanding the stack).
In a few cases, Step 3 is not needed:
-
on FreeBSD, a stack guard-page is implemented but disabled by default (CVE-2017-1083);
-
on OpenBSD, NetBSD, and FreeBSD, we discovered implementation vulnerabilities that eliminate the stack guard-page (CVE-2017-1000372, CVE-2017-1000374, CVE-2017-1084).
On Linux, we devised general methods for jumping over the stack guard-page (CVE-2017-1000366):
- The glibc's __dcigettext() function alloca()tes single_locale, a stack-based buffer of up to 128KB (MAX_ARG_STRLEN, man execve), the length of the LANGUAGE environment variable (if the current locale is neither "C" nor "POSIX", but distributions install default locales such as "C.UTF-8" and "en_US.utf8").
If LANGUAGE is mostly composed of ':' characters, then single_locale is barely written to, and can be used to jump over the stack guard-page.
Moreover, if __dcigettext() finds the message to be translated, then _nl_find_msg() strdup()licates the OUTPUT_CHARSET environment variable and allows a local attacker to immediately smash the stack and gain control of the instruction pointer (the eip register, on i386), as detailed in Step 4a.
We exploited this stack-clash against Sudo and su, but most of the SUID (set-user-ID) and SGID (set-group-ID) binaries that call setlocale(LC_ALL, "") and __dcigettext() or its derivatives (the *gettext() functions, the _() convenience macro, the strerror() function) are exploitable.
- The glibc's vfprintf() function (called by the *printf() family of functions) alloca()tes a stack-based work buffer of up to 64KB (__MAX_ALLOCA_CUTOFF) if a width or precision is greater than 1KB (WORK_BUFFER_SIZE).
If the corresponding format specifier is %s then this work buffer is never written to and can be used to jump over the stack guard-page.
None of our exploits is based on this method, but it was one of our ideas to exploit Exim remotely, as mentioned in IV.1.1.
- The glibc's getaddrinfo() function calls gaih_inet(), which alloca()tes tmpbuf, a stack-based buffer of up to 64KB (__MAX_ALLOCA_CUTOFF) that may be used to jump over the stack guard-page.
Moreover, gaih_inet() calls the gethostbyname*() functions, which malloc()ate a heap-based DNS response of up to 64KB (MAXPACKET) that may allow a remote attacker to immediately smash the stack, as detailed in Step 4a.
None of our exploits is based on this method, but it may be the key to the remote exploitation of stack-clashes.
- The glibc's run-time dynamic linker ld.so alloca()tes llp_tmp, a stack-based copy of the LD_LIBRARY_PATH environment variable. If LD_LIBRARY_PATH contains Dynamic String Tokens (DSTs), they are first expanded: llp_tmp can be larger than 128KB (MAX_ARG_STRLEN) and not fully written to, and can therefore be used to jump over the stack guard-page and smash the memory region mapped directly below, as detailed in Step 4b.
We exploited this ld.so stack-clash in two data-only attacks that bypass NX (No-eXecute) and ASLR (Address Space Layout Randomization) and obtain a privileged shell through most SUID and SGID binaries on most i386 Linux distributions.
- Several local and remote applications allocate a 256KB stack-based "gid_t buffer[NGROUPS_MAX];" that is not fully written to and can be used to move the stack-pointer to the start of the stack (Step 2) and jump over the guard-page (Step 3). For example, Exim's main() function and older versions of util-linux's su.
None of our exploits is based on this method, but an experimental version of our Exim exploit unexpectedly gained control of eip after the group_list[] buffer had jumped over the stack guard-page.
======================================================================== II.3.4. Step 4: Either smash the stack with another memory region (Step 4a) or smash another memory region with the stack (Step 4b) ========================================================================
Smash and grab, it's that kind of world.
--The Clash, "One Emotion"
In Step 3, a function allocates a large stack-based buffer and jumps over the stack guard-page into the memory region mapped directly below; in Step 4, before this function returns and jumps back into the stack:
- Step 4a: a write to the memory region mapped below the stack (where esp still points to) effectively smashes the stack. We exploit this general method for completing Step 4 in Exim, Sudo, and su:
. we overwrite a return-address on the stack and gain control of eip;
. we return-into-libc (into system() or __libc_dlopen()) to defeat NX;
. we brute-force ASLR (8 bits of entropy) if CVE-2016-3672 is patched;
. we bypass SSP (Stack-Smashing Protector) because we overwrite the return-address of a function that is not protected by a stack canary (the memcpy() that smashes the stack usually overwrites its own stack-frame and return-address).
- Step 4b: a write to the stack effectively smashes the memory region mapped below (where esp still points to). This second method for completing Step 4 is application-specific (it depends on the contents of the memory region that we smash) unless we exploit the run-time dynamic linker ld.so:
. on Solaris, we devised a general method for smashing ld.so's read-write segment, overwriting one of its function pointers, and executing our own shell-code;
. on Linux, we exploited most SUID and SGID binaries through ld.so: our "hwcap" exploit smashes an mmap()ed string, and our ".dynamic" exploit smashes a PIE's read-write segment before it is mprotect()ed read-only by Full RELRO (Full RELocate Read-Only -- GNU_RELRO and BIND_NOW).
======================================================================== III. Solutions ========================================================================
Based on our research, we recommend that the affected operating systems:
- Increase the size of the stack guard-page to at least 1MB, and allow system administrators to easily modify this value (for example, grsecurity/PaX introduced /proc/sys/vm/heap_stack_gap in 2010).
This first, short-term solution is cheap, but it can be defeated by a very large stack-based buffer.
- Recompile all userland code (ld.so, libraries, binaries) with GCC's "-fstack-check" option, which prevents the stack-pointer from moving into another memory region without accessing the stack guard-page (it writes one word to every 4KB page allocated on the stack).
This second, long-term solution is expensive, but it cannot be defeated (even if the stack guard-page is only 4KB, one page) -- unless a vulnerability is discovered in the implementation of the stack guard-page or the "-fstack-check" option.
======================================================================== IV. Results ========================================================================
======================================================================== IV.1. Linux ========================================================================
======================================================================== IV.1.1. Exim ========================================================================
Debian 8.5
Crude exploitation
Our first exploit, a Local Privilege Escalation against Exim's SUID-root PIE (Position-Independent Executable) on i386 Debian 8.5, simply follows the four sequential steps outlined in II.3.
Step 1: Clash the stack with the heap
To reach the start of the stack with the end of the heap (man brk), we permanently leak memory through multiple -p command-line arguments that are malloc()ated by Exim but never free()d (CVE-2017-1000369) -- we call such a malloc()ated chunk of heap memory a "memleak-chunk".
Because the -p argument strings are originally allocated on the stack by execve(), we must cover half of the initial heap-stack distance (between the start of the heap and the end of the stack) with stack memory, and half of this distance with heap memory.
If we set the RLIMIT_STACK to 136MB (MIN_GAP, arch/x86/mm/mmap.c) then the initial heap-stack distance is minimal (randomized in a [96MB,137MB] range), but we cannot reach the stack with the heap because of the 1/4 limit imposed by the kernel on the argument and environment strings (man execve): 136MB/4=34MB of -p argument strings cannot cover 96MB/2=48MB, half of the minimum heap-stack distance.
Moreover, if we increase the RLIMIT_STACK, the initial heap-stack distance also increases and we still cannot reach the stack with the heap. However, if we set the RLIMIT_STACK to RLIM_INFINITY (4GB on i386) then the kernel switches from the default top-down mmap() layout to a legacy bottom-up mmap() layout, and:
-
the initial heap-stack distance is approximately 2GB, because the start of the heap (the initial brk()) is randomized above the address 0x40000000, and the end of the stack is randomized below the address 0xC0000000;
-
we can reach the stack with the heap, despite the 1/4 limit imposed by the kernel on the argument and environment strings, because 4GB/4=1GB of -p argument strings can cover 2GB/2=1GB, half of the initial heap-stack distance;
-
we clash the stack with the heap around the address 0x80000000.
Step 2: Move the stack-pointer (esp) to the start of the stack
The 256KB stack-based group_list[] in Exim's main() naturally consumes the 128KB of initial stack expansion, as mentioned in II.3.2.
Step 3: Jump over the stack guard-page and into the heap
To move esp from the start of the stack into the heap, without accessing the stack guard-page, we use a malformed -d command-line argument that is written to the 32KB (STRING_SPRINTF_BUFFER_SIZE) stack-based buffer in Exim's string_sprintf() function. This buffer is not fully written to and hence does not access the stack guard-page, because our -d argument string is much shorter than 32KB.
Step 4a: Smash the stack with the heap
Before string_sprintf() returns (and moves esp from the heap back into the stack) it calls string_copy(), which malloc()ates and memcpy()es our -d argument string to the end of the heap, where esp still points to -- we call this malloc()ated chunk of heap memory the "smashing-chunk".
This call to memcpy() therefore smashes its own stack-frame (which is not protected by SSP) with the contents of our smashing-chunk, and we overwrite memcpy()'s return-address with the address of libc's system() function (which is not randomized by ASLR because Debian 8.5 is vulnerable to CVE-2016-3672):
-
instead of smashing memcpy()'s stack-frame with an 8-byte pattern (the return-address to system() and its argument) we smash it with a simple 4-byte pattern (the return-address to system()), append "." to the PATH environment variable, and symlink() our exploit to the string that begins at the address of libc's system() function;
-
system() does not drop our escalated root privileges, because Debian's /bin/sh is dash, not bash and its -p option (man bash).
This first version of our Exim exploit obtained a root-shell after nearly a week of failed attempts; to improve this result, we analyzed every step of a successful run.
Refined exploitation
Step 1: Clash the stack with the heap
- The heap must be able to reach the stack [Condition 1]
The start of the heap is randomized in the 32MB range above the end of Exim's PIE (the end of its .bss section), but the growth of the heap is sometimes blocked by libraries that are mmap()ed within the same range (because of the legacy bottom-up mmap() layout). On Debian 8.5, Exim's libraries occupy about 8MB and thus block the growth of the heap with a probability of 8MB/32MB = 1/4.
When the heap is blocked by the libraries, malloc() switches from brk() to mmap()s of 1MB (MMAP_AS_MORECORE_SIZE), and our memory leak reaches the stack with mmap()s instead of the heap. Such a stack-clash is also exploitable, but its probability of success is low, as detailed in IV.1.6., and we therefore discarded this approach.
- The heap must always reach the stack, when not blocked by libraries
Because the initial heap-stack distance (between the start of the heap and the end of the stack) is a random variable:
-
either we allocate the exact amount of heap memory to cover the mean heap-stack distance, but the probability of success of this approach is low and we therefore discarded it;
-
or we allocate enough heap memory to always reach the stack, even when the initial heap-stack distance is maximal; after the heap reaches the stack, our memory leak allocates mmap()s of 1MB above the stack (below 0xC0000000) and below the heap (above the libraries), but it must not exhaust the address-space (the 1GB below 0x40000000 is unmappable);
-
the final heap-stack distance (between the end of the heap and the start of the stack) is also a random variable:
. its minimum value is 8KB (the stack guard-page, plus a safety page imposed by the brk() system-call in mm/mmap.c);
. its maximum value is roughly the size of a memleak-chunk, plus 128KB (DEFAULT_TOP_PAD, malloc/malloc.c).
Step 3: Jump over the stack guard-page and into the heap
-
The stack-pointer must jump over the guard-page and land into the free chunk at the end of the heap (the remainder of the heap after malloc() switches from brk() to mmap()), where both the smashing-chunk and memcpy()'s stack-frame are allocated and overwritten in Step 4a [Condition 2];
-
The write (of approximately smashing-chunk bytes) to string_sprintf()'s stack-based buffer (which starts where the guard-page jump lands) must not crash into the end of the heap [Condition 3].
Step 4a: Smash the stack with the heap
The smashing-chunk must be allocated into the free chunk at the end of the heap:
-
the smashing-chunk must not be allocated into the free chunks left over at the end of the 1MB mmap()s [Condition 4];
-
the memleak-chunks must not be allocated into the free chunk at the end of the heap [Condition 5].
Intuitively, the probability of gaining control of eip depends on the size of the smashing-chunk (the guard-page jump's landing-zone) and the size of the memleak-chunks (which determines the final heap-stack distance).
To maximize this probability, we wrote a helper program that imposes the following conditions on the smashing-chunk and memleak-chunks:
-
the smashing-chunk must be smaller than 32KB (STRING_SPRINTF_BUFFER_SIZE) [Condition 3];
-
the memleak-chunks must be smaller than 128KB (DEFAULT_MMAP_THRESHOLD, malloc/malloc.c);
-
the free chunk at the end of the heap must be larger than twice the smashing-chunk size [Conditions 2 and 3];
-
the free chunk at the end of the heap must be smaller than the memleak-chunk size [Condition 5];
-
when the final heap-stack distance is minimal, the 32KB (STRING_SPRINTF_BUFFER_SIZE) guard-page jump must land below the free chunk at the end of the heap [Condition 2];
-
the free chunks at the end of the 1MB mmap()s must be:
. either smaller than the smashing-chunk [Condition 4];
. or larger than the free chunk at the end of the heap (glibc's malloc() is a best-fit allocator) [Condition 4].
The resulting smashing-chunk and memleak-chunk sizes are:
smash: 10224 memleak: 27656 brk_min: 20464 brk_max: 24552 mmap_top: 25304 probability: 1/16 (0.06190487817)
In theory, the probability of gaining control of eip is 1/21: the product of the 1/16 probability calculated by this helper program (approximately (smashing-chunk / (memleak-chunk + DEFAULT_TOP_PAD))) and the 3/4 probability of reaching the stack with the heap [Condition 1].
In practice, on Debian 8.5, our final Exim exploit:
-
gains eip control in 1 run out of 28, on average;
-
takes 2.5 seconds per run (on a 4GB Virtual Machine);
-
has a good chance of obtaining a root-shell after 28*2.5 = 70 seconds;
-
uses 4GB of memory (2GB in the Exim process, and 2GB in the process fork()ed by system()).
Debian 8.6
Unlike Debian 8.5, Debian 8.6 is not vulnerable to CVE-2016-3672: after gaining eip control in Step 4a (Smash), the probability of successfully returning-into-libc's system() function is 1/256 (8 bits of entropy -- libraries are randomized in a 1MB range but aligned on 4KB).
Consequently, our final Exim exploit has a good chance of obtaining a root-shell on Debian 8.6 after 256282.5 seconds = 5 hours (256*28=7168 runs).
As we were drafting this advisory, we tried an alternative approach against Exim on Debian 8.6: we discovered that its stack is executable, because it depends on libgnutls-deb0, which depends on libp11-kit, which depends on libffi, which incorrectly requires an executable GNU_STACK (CVE-2017-1000376).
Initially, we discarded this approach because our 1GB of -p argument strings on the stack is not executable (_dl_make_stack_executable() only mprotect()s the stack below argv[] and envp[]):
41e00000-723d7000 rw-p 00000000 00:00 0 [heap] 802f1000-80334000 rwxp 00000000 00:00 0 [stack] 80334000-bfce6000 rw-p 00000000 00:00 0
and because the stack is randomized in an 8MB range but we do not control the contents of any large buffer on the executable stack.
Later, we discovered that two 128KB (MAX_ARG_STRLEN) copies of the LD_PRELOAD environment variable can be allocated onto the executable stack by ld.so's dl_main() and open_path() functions, automatically freed upon return from these functions, and re-allocated (but not overwritten) by Exim's 256KB stack-based group_list[].
In theory, the probability of returning into our shell-code (into these executable copies of LD_PRELOAD) is 1/32 (2128KB/8MB), higher than the 1/256 probability of returning-into-libc. In practice, this alternative Exim exploit has a good chance of obtaining a root-shell after 1174 runs -- instead of 3228=896 runs in theory, because the two 128KB copies of LD_PRELOAD are never perfectly aligned with Exim's 256KB group_list[] -- or 1174*2.5 seconds = 50 minutes.
Debian 9 and 10
Unlike Debian 8, Debian 9 and 10 are not vulnerable to offset2lib, a minor weakness in Linux's ASLR that coincidentally affects Step 1 (Clash) of our stack-clash exploits:
https://cybersecurity.upv.es/attacks/offset2lib/offset2lib.html https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1fd836dcf00d2028c700c7e44d2c23404062c90
If we set RLIMIT_STACK to RLIM_INFINITY, the kernel still switches to the legacy bottom-up mmap() layout, and the libraries are randomized in the 1MB range above the address 0x40000000, but Exim's PIE is randomized in the 1MB range above the address 0x80000000 and the heap is randomized in the 32MB range above the PIE's .bss section. As a result:
-
the heap is always able to reach the stack, because its growth is never blocked by the libraries -- the theoretical probability of gaining eip control is 1/16, the probability calculated by our helper program;
-
the heap clashes with the stack around the address 0xA0000000, because the initial heap-stack distance is 1GB (0xC0000000-0x80000000) and can be covered with 512MB of heap memory and 512MB of stack memory.
Remote exploitation
Exim's string_sprintf() or glibc's vfprintf() can be used to remotely complete Steps 3 and 4 of the stack-clash; and the 256KB group_list[] in Exim's main() naturally consumes the 128KB of initial stack expansion in Step 2; but another 256KB group_list[] in Exim's exim_setugid() further decreases the start address of the stack and prevents us from remotely completing Step 2 and exploiting Exim.
======================================================================== IV.1.2. Sudo ========================================================================
Introduction
We discovered a vulnerability in Sudo's get_process_ttyname() for Linux: this function opens "/proc/[pid]/stat" (man proc) and reads the device number of the tty from field 7 (tty_nr). Unfortunately, these fields are space-separated and field 2 (comm, the filename of the command) can contain spaces (CVE-2017-1000367).
For example, if we execute Sudo through the symlink "./ 1 ", get_process_ttyname() calls sudo_ttyname_dev() to search for the non-existent tty device number "1" in the built-in search_devs[].
Next, sudo_ttyname_dev() calls the recursive function sudo_ttyname_scan() to search for this non-existent tty device number "1" in a breadth-first traversal of "/dev".
Last, we exploit this recursive function during its traversal of the world-writable "/dev/shm", and allocate hundreds of megabytes of heap memory from the filesystem (directory pathnames) instead of the stack (the command-line arguments and environment variables allocated by our other stack-clash exploits).
Step 1: Clash the stack with the heap
sudo_ttyname_scan() strdup()licates the pathnames of the directories and sub-directories that it traverses, but does not free() them until it returns. Each one of these "memleak-chunks" allocates at most 4KB (PATH_MAX) of heap memory.
Step 2: Move the stack-pointer to the start of the stack
The recursive calls to sudo_ttyname_scan() allocate 4KB (PATH_MAX) stack-frames that naturally consume the 128KB of initial stack expansion.
Step 3: Jump over the stack guard-page and into the heap
If the length of a directory pathname reaches 4KB (PATH_MAX), sudo_ttyname_scan() calls warning(), which calls strerror() and _(), which call gettext() and allow us to jump over the stack guard-page with an alloca() of up to 128KB (the LANGUAGE environment variable), as explained in II.3.3.
Step 4a: Smash the stack with the heap
The self-contained gettext() exploitation method malloc()ates and memcpy()es a "smashing-chunk" of up to 128KB (the OUTPUT_CHARSET environment variable) that smashes memcpy()'s stack-frame and return-address, as explained in II.3.4.
Debian 8.5
Step 1: Clash the stack with the heap
Debian 8.5 is vulnerable to CVE-2016-3672: if we set RLIMIT_STACK to RLIM_INFINITY, the kernel switches to the legacy bottom-up mmap() layout and disables the ASLR of Sudo's PIE and libraries, but still the initial heap-stack distance is randomized and roughly 2GB (0xC0000000-0x40000000 -- the start of the heap is randomized in a 32MB range above 0x40000000, and the end of the stack is randomized in the 8MB range below 0xC0000000).
To reach the start of the stack with the end of the heap, we allocate hundreds of megabytes of heap memory from the filesystem (directory pathnames), and:
-
the heap must be able to reach the stack -- on Debian 8.5, Sudo's libraries occupy about 3MB and hence block the growth of the heap with a probability of 3MB/32MB ~= 1/11;
-
when not blocked by the libraries, the heap must always reach the stack, even when the initial heap-stack distance is maximal (as detailed in IV.1.1.);
-
we cover half of the initial heap-stack distance with 1GB of heap memory (the memleak-chunks, strdup()licated directory pathnames);
-
we cover the other half of this distance with 1GB of stack memory (the maximum permitted by the kernel's 1/4 limit on the argument and environment strings) and thus reduce our on-disk inode usage;
-
we redirect sudo_ttyname_scan()'s traversal of /dev to /var/tmp (through a symlink planted in /dev/shm) to work around the small number of inodes available in /dev/shm.
After the heap reaches the stack and malloc() switches from brk() to mmap()s of 1MB:
-
the size of the free chunk left over at the end of the heap is a random variable in the [0B,4KB] range -- 4KB (PATH_MAX) is the approximate size of a memleak-chunk;
-
the final heap-stack distance (between the end of the heap and the start of the stack) is a random variable in the [8KB,4KB+128KB=132KB] range -- the size of a memleak-chunk plus 128KB (DEFAULT_TOP_PAD);
-
sudo_ttyname_scan() recurses a few more times and therefore allocates more stack memory, but this stack expansion is blocked by the heap and crashes into the stack guard-page after 16 recursions on average (132KB/4KB/2, where 132KB is the maximum final heap-stack distance, and 4KB is the size of sudo_ttyname_scan()'s stack-frame).
To solve this unexpected problem, we:
-
first, redirect sudo_ttyname_scan() to a directory tree "A" in /var/tmp that recurses and allocates stack memory, but does not allocate heap memory (each directory level contains only one entry, the sub-directory that is connected to the next directory level);
-
second, redirect sudo_ttyname_scan() to a directory tree "B" in /var/tmp that recurses and allocates heap memory (each directory level contains many entries), but does not allocate more stack memory (it simply consumes the stack memory that was already allocated by the directory tree "A"): it does not further expand the stack, and does not crash into the guard-page.
Finally, we increase the speed of our exploit and avoid thousands of useless recursions:
-
in each directory level traversed by sudo_ttyname_scan(), we randomly modify the names of its sub-directories until the first call to readdir() returns the only sub-directory that is connected to the next level of the directory tree (all other sub-directories allocate heap memory but are otherwise empty);
-
we dup2() Sudo's stdout and stderr to a pipe with no readers that terminates Sudo with a SIGPIPE if sudo_ttyname_scan() calls warning() and sudo_printf() (a failed exploit attempt, usually because the final heap-stack distance is much longer or shorter than the guard-page jump).
Step 2: Move the stack-pointer to the start of the stack
sudo_ttyname_scan() allocates a 4KB (PATH_MAX) stack-based pathbuf[] that naturally consumes the 128KB of initial stack expansion in fewer than 128KB/4KB=32 recursive calls.
The recursive calls to sudo_ttyname_scan() allocate less than 8MB of stack memory: the maximum number of recursions (PATH_MAX / strlen("/a") = 2K) multiplied by the size of sudo_ttyname_scan()'s stack-frame (4KB).
Step 3: Jump over the stack guard-page and into the heap
The length of the guard-page jump in gettext() is the length of the LANGUAGE environment variable (at most 128KB, MAX_ARG_STRLEN): we take a 64KB jump, well within the range of the final heap-stack distance; this jump then lands into the free chunk at the end of the heap, where the smashing-chunk will be allocated in Step 4a, with a probability of (smashing-chunk / (memleak-chunk + DEFAULT_TOP_PAD)).
If available, we assign "C.UTF-8" to the LC_ALL environment variable, and prepend "be" to our 64KB LANGUAGE environment variable, because these minimal locales do not interfere with our heap feng-shui.
Step 4a: Smash the stack with the heap
In gettext(), the smashing-chunk (a malloc() and memcpy() of the OUTPUT_CHARSET environment variable) must be allocated into the free chunk at the end of the heap, where the stack-frame of memcpy() is also allocated.
First, if the size of our memleak-chunks is exactly 4KB+8B (PATH_MAX+MALLOC_ALIGNMENT), then:
-
the size of the free chunk at the end of the heap is a random variable in the [0B,4KB] range;
-
the size of the free chunks left over at the end of the 1MB mmap()s is roughly 1MB%(4KB+8B)=2KB.
Second, if the size of our smashing-chunk is about 2KB+256B (PATH_MAX/2+NAME_MAX), then:
-
it is always larger than (and never allocated into) the free chunks at the end of the 1MB mmap()s;
-
it is smaller than (and allocated into) the free chunk at the end of the heap with a probability of roughly 1-(2KB+256B)/4KB.
Last, in each level of our directory tree "B", sudo_ttyname_scan() malloc()ates and realloc()ates an array of pointers to sub-directories, but these realloc()s prevent the smashing-chunk from being allocated into the free chunk at the end of the heap:
-
they create holes in the heap, where the smashing-chunk may be allocated to;
-
they may allocate the free chunk at the end of the heap, where the smashing-chunk should be allocated to.
To solve these problems, we carefully calculate the number of sub-directories in each level of our directory tree "B":
- we limit the size of the realloc()s -- and hence the size of the holes that they create -- to 4KB+2KB:
. either a memleak-chunk is allocated into such a hole, and the remainder is smaller than the smashing-chunk ("not a fit");
. or such a hole is not allocated, but it is larger than the largest free chunk at the end of the heap ("a worse fit");
- we gradually reduce the final size of the realloc()s in the last levels of our directory tree "B", and hence re-allocate the holes created in the previous levels.
In theory, on Debian 8.5, the probability of gaining control of eip is approximately 1/148, the product of:
-
(Step 1) the probability of reaching the stack with the heap: 1-3MB/32MB;
-
(Step 3) the probability of jumping over the stack guard-page and into the free chunk at the end of the heap: (2KB+256B) / (4KB+8B + 128KB);
-
(Step 4a) the probability of allocating the smashing-chunk into the free chunk at the end of the heap: 1-(2KB+256B)/4KB.
In practice, on Debian 8.5, this Sudo exploit:
-
gains eip control in 1 run out of 200, on average;
-
takes 2.8 seconds per run (on a 4GB Virtual Machine);
-
has a good chance of obtaining a root-shell after 200 * 2.8 seconds = 9 minutes;
-
uses 2GB of memory.
Note: we do not return-into-libc's system() in Step 4a because /bin/sh may be bash, which drops our escalated root privileges upon execution. Instead, we:
-
either return-into-libc's __gconv_find_shlib() function through find_module(), which loads this function's argument from -0x20(%ebp);
-
or return-into-libc's __libc_dlopen_mode() function through nss_load_library(), which loads this function's argument from -0x1c(%ebp);
-
search the libc for a relative pathname that contains a slash character (for example, "./fork.c") and pass its address to __gconv_find_shlib() or __libc_dlopen_mode();
-
symlink() our PIE exploit to this pathname, and let Sudo execute our _init() constructor as root, upon successful exploitation.
Debian 8.6
Unlike Debian 8.5, Debian 8.6 is not vulnerable to CVE-2016-3672: Sudo's PIE and libraries are always randomized, even if we set RLIMIT_STACK to RLIM_INFINITY; the probability of successfully returning-into-libc, after gaining eip control in Step 4a (Smash), is 1/256.
However, Debian 8.6 is still vulnerable to offset2lib, the minor weakness in Linux's ASLR that coincidentally affects Step 1 (Clash) of our stack-clash exploits:
-
if we set RLIMIT_STACK to 136MB (MIN_GAP) or less (the default is 8MB), then the initial heap-stack distance (between the start of the heap and the end of the stack) is minimal, a random variable in the [96MB,137MB] range;
-
instead of allocating 1GB of heap memory and 1GB of stack memory to clash the stack with the heap, we merely allocate 137MB of heap memory (directory pathnames from our directory tree "B") and no stack memory.
In theory, on Debian 8.6, the probability of gaining eip control is 1/134 (instead of 1/148 on Debian 8.5) because the growth of the heap is never blocked by Sudo's libraries; and in practice, this Sudo exploit takes only 0.15 second per run (instead of 2.8 on Debian 8.5).
Independent exploitation
The vulnerability that we discovered in Sudo's get_process_ttyname() function for Linux (CVE-2017-1000367) is exploitable independently of its stack-clash repercussions: through this vulnerability, a local user can pretend that his tty is any character device on the filesystem, and after two race conditions, he can pretend that his tty is any file on the filesystem.
On an SELinux-enabled system, if a user is Sudoer for a command that does not grant him full root privileges, he can overwrite any file on the filesystem (including root-owned files) with this command's output, because relabel_tty() (in src/selinux.c) calls open(O_RDWR|O_NONBLOCK) on his tty and dup2()s it to the command's stdin, stdout, and stderr.
To exploit this vulnerability, we:
-
create a directory "/dev/shm/_tmp" (to work around /proc/sys/fs/protected_symlinks), and a symlink "/dev/shm/_tmp/_tty" to a non-existent pty "/dev/pts/57", whose device number is 34873;
-
run Sudo through a symlink "/dev/shm/_tmp/ 34873 " that spoofs the device number of this non-existent pty;
-
set the flag CD_RBAC_ENABLED through the command-line option "-r role" (where "role" can be our current role, for example "unconfined_r");
-
monitor our directory "/dev/shm/_tmp" (for an IN_OPEN inotify event) and wait until Sudo opendir()s it (because sudo_ttyname_dev() cannot find our non-existent pty in "/dev/pts/");
-
SIGSTOP Sudo, call openpty() until it creates our non-existent pty, and SIGCONT Sudo;
-
monitor our directory "/dev/shm/_tmp" (for an IN_CLOSE_NOWRITE inotify event) and wait until Sudo closedir()s it;
-
SIGSTOP Sudo, replace the symlink "/dev/shm/_tmp/_tty" to our now-existent pty with a symlink to the file that we want to overwrite (for example "/etc/passwd"), and SIGCONT Sudo;
-
control the output of the command executed by Sudo (the output that overwrites "/etc/passwd"):
. either through a command-specific method;
. or through a general method such as "--\nHELLO\nWORLD\n" (by default, getopt() prints an error message to stderr if it does not recognize an option character).
To reliably win the two SIGSTOP races, we preempt the Sudo process: we setpriority() it to the lowest priority, sched_setscheduler() it to SCHED_IDLE, and sched_setaffinity() it to the same CPU as our exploit.
[john@localhost ~]$ head -n 8 /etc/passwd root:x:0:0:root:/root:/bin/bash bin:x:1:1:bin:/bin:/sbin/nologin daemon:x:2:2:daemon:/sbin:/sbin/nologin adm:x:3:4:adm:/var/adm:/sbin/nologin lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin sync:x:5:0:sync:/sbin:/bin/sync shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown halt:x:7:0:halt:/sbin:/sbin/halt
[john@localhost ~]$ sudo -l [sudo] password for john: ... User john may run the following commands on localhost: (ALL) /usr/bin/sum
[john@localhost ~]$ ./Linux_sudo_CVE-2017-1000367 /usr/bin/sum $'--\nHELLO\nWORLD\n' [sudo] password for john:
[john@localhost ~]$ head -n 8 /etc/passwd /usr/bin/sum: unrecognized option '-- HELLO WORLD ' Try '/usr/bin/sum --help' for more information. ogin adm:x:3:4:adm:/var/adm:/sbin/nologin lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin
======================================================================== IV.1.3. ld.so "hwcap" exploit ========================================================================
"ld.so and ld-linux.so* find and load the shared libraries needed by a program, prepare the program to run, and then run it." (man ld.so)
Through ld.so, most SUID and SGID binaries on most i386 Linux distributions are exploitable. For example: Debian 7, 8, 9, 10; Fedora 23, 24, 25; CentOS 5, 6, 7.
Debian 8.5
Step 1: Clash the stack with anonymous mmap()s
The minimal malloc() implementation in ld.so calls mmap(), not brk(), to obtain memory from the system, and it never calls munmap(). To reach the start of the stack with anonymous mmap()s, we:
-
set RLIMIT_STACK to RLIM_INFINITY and switch from the default top-down mmap() layout to the legacy bottom-up mmap() layout;
-
cover half of the initial mmap-stack distance (0xC0000000-0x40000000=2GB) with 1GB of stack memory (the maximum permitted by the kernel's 1/4 limit on the argument and environment strings);
-
cover the other half of this distance with 1GB of anonymous mmap()s, through multiple LD_AUDIT environment variables that permanently leak millions of audit_list structures (CVE-2017-1000366) in process_envvars() and process_dl_audit() (elf/rtld.c).
Step 2: Move the stack-pointer to the start of the stack
To consume the 128KB of initial stack expansion, we simply pass 128KB of argv[] and envp[] pointers to execve(), as explained in II.3.2.
Step 3: Jump over the stack guard-page and into the anonymous mmap()s
_dl_init_paths() (elf/dl-load.c), which is called by dl_main() after process_envvars(), alloca()tes llp_tmp, a stack-based buffer large enough to hold the LD_LIBRARY_PATH environment variable and any combination of Dynamic String Token (DST) replacement strings. To calculate the size of llp_tmp, _dl_init_paths() must:
-
first, scan LD_LIBRARY_PATH and count all DSTs ($LIB, $PLATFORM, and $ORIGIN);
-
second, multiply the number of DSTs by the length of the longest DST replacement string (on Debian, $LIB is replaced by the 18-char-long "lib/i386-linux-gnu", $PLATFORM by "i386" or "i686", and $ORIGIN by the pathname of the program's directory, for example "/bin" or "/usr/sbin" -- the longest DST replacement string is usually "lib/i386-linux-gnu");
-
last, add the length of the original LD_LIBRARY_PATH.
Consequently, if LD_LIBRARY_PATH contains many DSTs that are replaced by the shortest DST replacement string, then llp_tmp is large but not fully written to, and can be used to jump over the stack guard-page and into the anonymous mmap()s.
Our ld.so exploits do not use $ORIGIN because it is ignored by several distributions and glibc versions; for example:
2010-12-09 Andreas Schwab schwab@redhat.com
* elf/dl-object.c (_dl_new_object): Ignore origin of privileged
program.
Index: glibc-2.12-2-gc4ccff1/elf/dl-object.c
--- glibc-2.12-2-gc4ccff1.orig/elf/dl-object.c +++ glibc-2.12-2-gc4ccff1/elf/dl-object.c @@ -214,6 +214,9 @@ _dl_new_object (char realname, const ch out: new->l_origin = origin; } + else if (INTUSE(__libc_enable_secure) && type == lt_executable) + / The origin of a privileged program cannot be trusted. / + new->l_origin = (char ) -1;
return new; }
Step 4b: Smash an anonymous mmap() with the stack
Before _dl_init_paths() returns to dl_main() and jumps back from the anonymous mmap()s into the stack, we overwrite the block of mmap()ed memory malloc()ated by _dl_important_hwcaps() with the contents of the stack-based buffer llp_tmp.
- The block of memory malloc()ated by _dl_important_hwcaps() is divided in two:
. The first part (the "hwcap-pointers") is an array of r_strlenpair structures that point to the hardware-capability strings stored in the second part of this memory block. The second part (the "hwcap-strings") contains strings of hardware-capabilities that are appended to the pathnames of trusted directories, such as "/lib/" and "/lib/i386-linux-gnu/", when open_path() searches for audit libraries (LD_AUDIT), preload libraries (LD_PRELOAD), or dependent libraries (DT_NEEDED).
For example, on Debian, when open_path() finds "libc.so.6" in
"/lib/i386-linux-gnu/i686/cmov/", "i686/cmov/" is such a
hardware-capability string.
- To overwrite the block of memory malloc()ated by _dl_important_hwcaps() with the contents of the stack-based buffer llp_tmp, we divide our LD_LIBRARY_PATH environment variable in two:
. The first, static part (our "good-write") overwrites the first hardware-capability string with characters that we do control. The second, dynamic part (our "bad-write") overwrites the last hardware-capability strings with characters that we do not control (the short DST replacement strings that enlarge llp_tmp and allow us to jump over the stack guard-page).
If our 16-byte-aligned good-write overwrites the 8-byte-aligned first hardware-capability string with the 8-byte pattern "/../tmp/", and if we append the trusted directory "/lib" to our LD_LIBRARY_PATH, then (after _dl_init_paths() returns to dl_main()):
-
dlmopen_doit() tries to load an LD_AUDIT library "a" (our memory leak from Step 1);
-
_dl_map_object() searches for "a" in the trusted directory "/lib" from our LD_LIBRARY_PATH;
-
open_path() finds our library "a" in "/lib//../tmp//../tmp//../tmp/" because we overwrote the first hardware-capability string with the pattern "/../tmp/";
-
dl_open_worker() executes our library's _init() constructor, as root.
In theory, this exploit's probability of success depends on:
- (event A) the size of rtld_search_dirs.dirs[0], an array of r_search_path_elem structures that are malloc()ated by _dl_init_paths() after the _dl_important_hwcaps(), and must be allocated above the stack (below 0xC0000000), not below the stack where it would interfere with Steps 3 (Jump) and 4b (Smash):
P(A) = 1 - size of rtld_search_dirs.dirs[0] / max stack randomization
- (event B) the size of the hwcap-pointers and the size of our good-write, which must overwrite the first hardware-capability string, but not the first hardware-capability pointer (to this string):
P(B|A) = MIN(size of hwcap-pointers, size of good-write) / (max stack randomization - size of rtld_search_dirs.dirs[0])
- (event C) the size of the hwcap-strings and the size of our bad-write, which must not write past the end of hwcap-strings; but we guarantee that size of hwcap-strings >= size of good-write + size of bad-write:
P(C|B) = 1
In practice, we use the LD_HWCAP_MASK environment variable to maximize this exploit's probability of success, because:
-
the size of the hwcap-pointers -- which act as a cushion that absorbs the excess of good-write without crashing,
-
the size of the hwcap-strings -- which act as a cushion that absorbs the excess of good-write and bad-write without crashing,
-
and the size of rtld_search_dirs.dirs[0],
are all proportional to 2^N, where N is the number of supported hardware-capabilities that we enable in LD_HWCAP_MASK.
For example, on Debian 8.5, this exploit:
-
has a 1/151 probability of success;
-
takes 5.5 seconds per run (on a 4GB Virtual Machine);
-
has a good chance of obtaining a root-shell after 151 * 5.5 seconds = 14 minutes.
Debian 8.6
Unlike Debian 8.5, Debian 8.6 is not vulnerable to CVE-2016-3672, but our ld.so "hwcap" exploit is a data-only attack and is not affected by the ASLR of the libraries and PIEs.
Debian 9 and 10
Unlike Debian 8, Debian 9 and 10 are not vulnerable to offset2lib: if we set RLIMIT_STACK to RLIM_INFINITY, the libraries are randomized above the address 0x40000000, but the PIE is randomized above 0x80000000 (instead of 0x40000000 before the offset2lib patch).
Unfortunately, we discovered a vulnerability in the offset2lib patch (CVE-2017-1000370): if the PIE is execve()d with 1GB of argument or environment strings (the maximum permitted by the kernel's 1/4 limit) then the stack occupies the address 0x80000000, and the PIE is mapped above the address 0x40000000 instead, directly below the libraries. This vulnerability effectively nullifies the offset2lib patch, and allows us to reuse our Debian 8 exploit against Debian 9 and 10.
$ ./Linux_offset2lib Run #1... CVE-2017-1000370 triggered 40076000-40078000 r-xp 00000000 00:26 25041 /tmp/Linux_offset2lib 40078000-40079000 r--p 00001000 00:26 25041 /tmp/Linux_offset2lib 40079000-4009b000 rw-p 00002000 00:26 25041 /tmp/Linux_offset2lib 4009b000-400c0000 r-xp 00000000 fd:00 8463588 /usr/lib/ld-2.24.so 400c0000-400c1000 r--p 00024000 fd:00 8463588 /usr/lib/ld-2.24.so 400c1000-400c2000 rw-p 00025000 fd:00 8463588 /usr/lib/ld-2.24.so 400c2000-400c4000 r--p 00000000 00:00 0 [vvar] 400c4000-400c6000 r-xp 00000000 00:00 0 [vdso] 400c6000-400c8000 rw-p 00000000 00:00 0 400cf000-402a3000 r-xp 00000000 fd:00 8463595 /usr/lib/libc-2.24.so 402a3000-402a4000 ---p 001d4000 fd:00 8463595 /usr/lib/libc-2.24.so 402a4000-402a6000 r--p 001d4000 fd:00 8463595 /usr/lib/libc-2.24.so 402a6000-402a7000 rw-p 001d6000 fd:00 8463595 /usr/lib/libc-2.24.so 402a7000-402aa000 rw-p 00000000 00:00 0 7fcf1000-bfcf2000 rw-p 00000000 00:00 0 [stack]
Caveats
- On Fedora and CentOS, this ld.so "hwcap" exploit fails against /usr/bin/passwd and /usr/bin/chage (but it works against all other SUID-root binaries) because of SELinux:
type=AVC msg=audit(1492091008.983:414): avc: denied { execute } for pid=2169 comm="passwd" path="/var/tmp/a" dev="dm-0" ino=12828063 scontext=unconfined_u:unconfined_r:passwd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=file permissive=0
type=AVC msg=audit(1492092997.581:487): avc: denied { execute } for pid=2648 comm="chage" path="/var/tmp/a" dev="dm-0" ino=12828063 scontext=unconfined_u:unconfined_r:passwd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=file permissive=0
- It fails against recent versions of Sudo that specify an RPATH such as "/usr/lib/sudo": _dl_map_object() first searches for our LD_AUDIT library in RPATH, but open_path() fails to find our library in "/usr/lib/sudo//../tmp/" and crashes as soon as it reaches an overwritten hwcap-pointer.
This problem can be solved by a 16-byte pattern "///../../../tmp/" (instead of the 8-byte pattern "/../tmp/") but the exploit's probability of success would be divided by two.
- On Ubuntu, this ld.so "hwcap" exploit always fails, because of the following patch:
Description: pro-actively disable LD_AUDIT for setuid binaries, regardless of where the libraries are loaded from. This is to try to make sure that CVE-2010-3856 cannot sneak back in. Upstream is unlikely to take this, since it limits the functionality of LD_AUDIT. Author: Kees Cook kees@ubuntu.com
Index: eglibc-2.15/elf/rtld.c
--- eglibc-2.15.orig/elf/rtld.c 2012-05-09 10:05:29.456899131 -0700 +++ eglibc-2.15/elf/rtld.c 2012-05-09 10:38:53.952009069 -0700 @@ -2529,7 +2529,7 @@ while ((p = (strsep) (&str, ":")) != NULL) if (p[0] != '\0' && (__builtin_expect (! __libc_enable_secure, 1) - || strchr (p, '/') == NULL)) + )) { / This is using the local malloc, not the system malloc. The memory can never be freed. /
======================================================================== IV.1.4. ld.so ".dynamic" exploit ========================================================================
To exploit ld.so without the LD_AUDIT memory leak, we rely on a second vulnerability that we discovered in the offset2lib patch (CVE-2017-1000371):
if we set RLIMIT_STACK to RLIM_INFINITY, and allocate nearly 1GB of stack memory (the maximum permitted by the kernel's 1/4 limit on the argument and environment strings) then the stack grows down to almost 0x80000000, and because the PIE is mapped above 0x80000000, the minimum distance between the end of the PIE's read-write segment and the start of the stack is 4KB (the stack guard-page).
$ ./Linux_offset2lib 0x3f800000 Run #1... Run #2... Run #3... Run #796... Run #797... Run #798... CVE-2017-1000371 triggered 4007b000-400a0000 r-xp 00000000 fd:00 8463588 /usr/lib/ld-2.24.so 400a0000-400a1000 r--p 00024000 fd:00 8463588 /usr/lib/ld-2.24.so 400a1000-400a2000 rw-p 00025000 fd:00 8463588 /usr/lib/ld-2.24.so 400a2000-400a4000 r--p 00000000 00:00 0 [vvar] 400a4000-400a6000 r-xp 00000000 00:00 0 [vdso] 400a6000-400a8000 rw-p 00000000 00:00 0 400af000-40283000 r-xp 00000000 fd:00 8463595 /usr/lib/libc-2.24.so 40283000-40284000 ---p 001d4000 fd:00 8463595 /usr/lib/libc-2.24.so 40284000-40286000 r--p 001d4000 fd:00 8463595 /usr/lib/libc-2.24.so 40286000-40287000 rw-p 001d6000 fd:00 8463595 /usr/lib/libc-2.24.so 40287000-4028a000 rw-p 00000000 00:00 0 8000a000-8000c000 r-xp 00000000 00:26 25041 /tmp/Linux_offset2lib 8000c000-8000d000 r--p 00001000 00:26 25041 /tmp/Linux_offset2lib 8000d000-8002f000 rw-p 00002000 00:26 25041 /tmp/Linux_offset2lib 80030000-bf831000 rw-p 00000000 00:00 0 [heap]
Note: in this example, the "[stack]" is incorrectly displayed as the "[heap]" by show_map_vma() (in fs/proc/task_mmu.c).
This completes Step 1: we clash the stack with the PIE's read-write segment; we complete the remaining steps as in the "hwcap" exploit:
-
Step 2: we consume the initial stack expansion with 128KB of argv[] and envp[] pointers;
-
Step 3: we jump over the stack guard-page and into the PIE's read-write segment with llp_tmp's alloca() (in _dl_init_paths());
-
Step 4b: we smash the PIE's read-write segment with llp_tmp's good-write and bad-write (in _dl_init_paths()); we can smash the following sections:
-
.data and .bss: but we discarded this application-specific approach;
-
.got: although protected by Full RELRO (Full RELocate Read-Only, GNU_RELRO and BIND_NOW) the .got is still writable when we smash it in _dl_init_paths(); however, within ld.so, the .got is written to but never read from, and we therefore discarded this approach;
-
.dynamic: our favored approach.
On i386, the .dynamic section is an array of Elf32_Dyn structures (an int32 d_tag, and the union of uint32 d_val and uint32 d_ptr) that contains entries such as:
-
DT_STRTAB, a pointer to the PIE's .dynstr section (a read-only string table): its d_tag (DT_STRTAB) is read (by elf_get_dynamic_info()) before we smash it in _dl_init_paths(), but its d_ptr is read (by _dl_map_object_deps()) after we smash it in _dl_init_paths();
-
DT_NEEDED, an offset into the .dynstr section: the pathname of a dependent library that must be loaded by _dl_map_object_deps().
If we overwrite the entire .dynamic section with the following 8-byte pattern (an Elf32_Dyn structure):
-
a DT_NEEDED d_tag,
-
a d_val equal to half the address of our own string table on the stack (16MB of argument strings, enough to defeat the 8MB stack randomization),
then _dl_map_object_deps() reads the pathname of this dependent library from DT_STRTAB.d_ptr + DT_NEEDED.d_val = our_strtab/2 + our_strtab/2 = our_strtab, and loads our own library, as root. This 8-byte pattern is simple, but poses two problems:
-
DT_NEEDED is an int32 equal to 1, but we smash the .dynamic section with a string copy that cannot contain null-bytes: to solve this first problem we use DT_AUXILIARY instead, which is equivalent but equal to 0x7ffffffd;
-
ld.so crashes before it returns from dl_main() (before it calls _dl_init() and executes our library's _init() constructor):
. in _dl_map_object_deps() because of our DT_AUXILIARY entry;
. in version_check_doit() because we overwrote the DT_VERNEED entry;
. in _dl_relocate_object() because we overwrote the DT_REL, DT_RELSZ, and DT_RELCOUNT entries.
To solve this second problem, we could overwrite the .dynamic section with a more complicated pattern that repairs these entries, but our exploit's probability of success would decrease significantly.
Instead, we take control of ld.so's execution flow as soon as _dl_map_object_deps() loads our library:
-
our library contains three executable LOAD segments,
-
but only the first and last segments are sanity-checked by _dl_map_object_from_fd() and _dl_map_segments(),
-
and all segments except the first are mmap()ed with MAP_FIXED by _dl_map_segments(),
-
so we can mmap() our second segment anywhere -- we mmap() it on top of ld.so's executable segment,
-
and return into our own code (instead of ld.so's) as soon as this second mmap() system-call returns.
Probabilities
The "hwcap" exploit taught us that this ".dynamic" exploit's probability of success depends on:
-
the size of the cushion below the .dynamic section, which can absorb the excess of "good-write" without crashing: the padding bytes between the start of the PIE's read-write segment and the start of its first read-write section;
-
the size of the cushion above the .dynamic section, which can absorb the excess of "good-write" and "bad-write" without crashing: the .got, .data, and .bss sections.
If we guarantee that (cushion above .dynamic > good-write + bad-write), then the theoretical probability of success is approximately:
MIN(cushion below .dynamic, good-write) / max stack randomization
The maximum size of the cushion below the .dynamic section is 4KB (one page) and hence the maximum probability of success is 4KB/8MB=1/2048. In practice, on Ubuntu 16.04.2:
-
the highest probability is 1/2589 (/bin/su) and the lowest probability is 1/9225 (/usr/lib/eject/dmcrypt-get-device);
-
each run uses 1GB of memory and takes 1.5 seconds (on a 4GB Virtual Machine);
-
this ld.so ".dynamic" exploit has a good chance of obtaining a root-shell after 2589 * 1.5 seconds ~= 1 hour.
======================================================================== IV.1.5. /bin/su ========================================================================
As we were drafting this advisory, we discovered a general method for completing Step 1 (Clash) of the stack-clash exploitation: the Linux kernel limits the size of the command-line arguments and environment variables to 1/4 of the RLIMIT_STACK, but it imposes this limit on the argument and environment strings, not on the argv[] and envp[] pointers to these strings (CVE-2017-1000365).
On i386, if we set RLIMIT_STACK to RLIM_INFINITY, the maximum number of argv[] and envp[] pointers is 1G (1/4 of the RLIMIT_STACK, divided by 1B, the minimum size of an argument or environment string). In theory, the maximum size of the initial stack is therefore 1G*(1B+4B)=5GB. In practice, this would exhaust the address-space and allows us to clash the stack with the memory region that is mapped below, without an application-specific memory leak.
This discovery allowed us to write alternative versions of our stack-clash exploits; for example:
-
an ld.so "hwcap" exploit against Ubuntu: we replace the LD_AUDIT memory leak with 2GB of stack memory (1GB of argument and environment strings, and 1GB of argv[] and envp[] pointers) and replace the LD_AUDIT library with an LD_PRELOAD library;
-
an ld.so ".dynamic" exploit against systems vulnerable to offset2lib: we reach the end of the PIE's read-write segment with only 128MB of stack memory (argument and environment strings and pointers).
These proofs-of-concept demonstrate a general method for completing Step 1 (Clash), but they are much slower than their original versions (10-20 seconds per run) because they pass millions of argv[] and envp[] pointers to execve().
Moreover, this discovery allowed us to exploit SUID binaries through general methods that do not depend on application-specific or ld.so vulnerabilities; if a SUID binary calls setlocale(LC_ALL, ""); and gettext() (or a derivative such as strerror() or _()), then it is exploitable:
-
Step 1: we clash the stack with the heap through millions of argument and environment strings and pointers;
-
Step 2: we consume the initial stack expansion with 128KB of argument and environment pointers;
-
Step 3: we jump over the stack guard-page and into the heap with the alloca()tion of the LANGUAGE environment variable in gettext();
-
Step 4a: we smash the stack with the malloc()ation of the OUTPUT_CHARSET environment variable in gettext() and thus gain control of eip.
For example, we exploited Debian's /bin/su (from the shadow-utils): its main() function calls setlocale() and save_caller_context(), which calls gettext() (through _()) if its stdin is not a tty.
Debian 8.5
Debian 8.5 is vulnerable to CVE-2016-3672: we set RLIMIT_STACK to RLIM_INFINITY and disable ASLR, clash the stack with the heap through 2GB of argument and environment strings and pointers (1GB of strings, 1GB of pointers), and return-into-libc's system() or __libc_dlopen():
-
the system() version uses 4GB of memory (2GB in the /bin/su process, and 2GB in the process fork()ed by system());
-
the __libc_dlopen() version uses only 2GB of memory, but ebp must point to our smashed data on the stack.
Debian 8.6
Debian 8.6 is vulnerable to offset2lib but not to CVE-2016-3672: we must brute-force the libc's ASLR (8 bits of entropy), but we clash the stack with the heap through only 128MB of argument and environment strings and pointers -- this /bin/su exploit can be parallelized.
======================================================================== IV.1.6. Grsecurity/PaX ========================================================================
https://grsecurity.net/
In 2010, grsecurity/PaX introduced a configurable stack guard-page: its size can be modified through /proc/sys/vm/heap_stack_gap and is 64KB by default (unlike the hard-coded 4KB stack guard-page in the vanilla kernel).
Unfortunately, a 64KB stack guard-page is not large enough, and can be jumped over with ld.so or gettext() (CVE-2017-1000377); for example, we were able to gain eip control against Sudo, but we were unable to obtain a root-shell or gain eip control against another application, because grsecurity/PaX imposes the following security measures:
-
it restricts the RLIMIT_STACK of SUID binaries to 8MB, which prevents us from switching to the legacy bottom-up mmap() layout (Step 1);
-
it restricts the argument and environment strings to 512KB, which prevents us from clashing the stack through megabytes of command-line arguments and environment variables (Step 1);
-
it randomizes the PIE and libraries with 16 bits of entropy (instead of 8 bits in vanilla), which prevents us from brute-forcing the ASLR and returning-into-libc (Step 4a);
-
it implements /proc/sys/kernel/grsecurity/deter_bruteforce (enabled by default), which limits the number of SUID crashes to 1 every 15 minutes (all Steps) and makes exploitation impossible.
Sudo
The vulnerability that we discovered in Sudo's get_process_ttyname() (CVE-2017-1000367) allows us to:
-
Step 1: clash the stack with 3GB of heap memory from the filesystem (directory pathnames) and bypass grsecurity/PaX's 512KB limit on the argument and environment strings;
-
Step 2: consume the 128KB of initial stack expansion with 3MB of recursive function calls and avoid grsecurity/PaX's 8MB restriction on the RLIMIT_STACK;
-
Step 3: jump over grsecurity/PaX's 64KB stack guard-page with a 128KB (MAX_ARG_STRLEN) alloca()tion of the LANGUAGE environment variable in gettext();
-
Step 4a: smash the stack with a 128KB (MAX_ARG_STRLEN) malloc()ation of the OUTPUT_CHARSET environment variable in gettext() -- the "smashing-chunk" -- and thus gain control of eip.
In Step 1, we nearly exhaust the address-space until finally malloc() switches from brk() to 1MB mmap()s and reaches the start of the stack with the very last 1MB mmap() that we allocate. The exact amount of memory that we must allocate to reach the stack with our last 1MB mmap() depends on the sum of three random variables: the 256MB randomization of the stack, the 64MB randomization of the heap, and the 1MB randomization of the NULL region.
To maximize the probability of jumping over the stack guard-page, into our last 1MB mmap() below the stack, and overwriting a return-address on the stack with our smashing-chunk:
-
(Step 1) we must allocate the mean amount of memory to reach the stack with our last 1MB mmap(): the sum of three uniform random variables is not uniform (https://en.wikipedia.org/wiki/Irwin-Hall_distribution), but the values within the 256MB-64MB-1MB=191MB plateau at the center of this bell-shaped probability distribution occur with a uniform and maximum probability of (1MB64MB)/(1MB64MB*256MB)=1/256MB;
-
(Step 1) the end of our last 1MB mmap() must be allocated at a distance within [stack guard-page (64KB), guard-page jump (128KB)] below the start of the stack: the guard-page jump (Step 3) then lands at a distance d within [0, guard-page jump - stack guard-page (64KB)] below the end of our last 1MB mmap();
-
(Step 4a) the end of our smashing-chunk must be allocated at the end of our last 1MB mmap(), above the landing-point of the guard-page jump: our smashing-chunk then overwrites a return-address on the stack, below the landing-point of the guard-page jump.
In theory, this probability is roughly:
SUM(d = 1; d < guard-page jump - stack guard-page; d++) d / (256MB*1MB)
~= ((guard-page jump - stack guard-page)^2 / 2) / (256MB*1MB)
~= 1 / 2^17
In practice, we tested this Sudo proof-of-concept on an i386 Debian 8.6 protected by the linux-grsec package from the jessie-backports, but we manually disabled /proc/sys/kernel/grsecurity/deter_bruteforce:
-
it uses 3GB of memory, and 800K on-disk inodes;
-
it takes 5.5 seconds per run (on a 4GB Virtual Machine);
-
it has a good chance of gaining eip control after 2^17 * 5.5 seconds = 200 hours; in our test:
PAX: From 192.168.56.1: execution attempt in: , 1b068000-a100d000 1b068000 PAX: terminating task: /usr/bin/sudo( 1 ):25465, uid/euid: 1000/0, PC: 41414141, SP: b8844f30 PAX: bytes at PC: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 PAX: bytes at SP-4: 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141
However, brute-forcing the ASLR to obtain a root-shell would take ~1500 years and makes exploitation impossible.
Moreover, if we enable /proc/sys/kernel/grsecurity/deter_bruteforce, gaining eip control would take ~1365 days, and obtaining a root-shell would take thousands of years.
======================================================================== IV.1.7. 64-bit exploitation ========================================================================
Introduction
The address-space of a 64-bit process is so vast that we initially thought it was impossible to clash the stack with another memory region; we were wrong.
Linux's execve() first randomizes the end of the mmap region (which grows top-down by default) and then randomizes the end of the stack region (which grows down, on x86). On amd64, the initial mmap-stack distance (between the end of the mmap region and the end of the stack region) is minimal when RLIMIT_STACK is lower than or equal to MIN_GAP (mmap_base() in arch/x86/mm/mmap.c), and then:
- the end of the mmap region is equal to (as calculated by arch_pick_mmap_layout() in arch/x86/mm/mmap.c):
mmap_end = TASK_SIZE - MIN_GAP - arch_mmap_rnd()
where:
. TASK_SIZE is the highest address of the user-space (0x7ffffffff000)
. MIN_GAP = 128MB + stack_maxrandom_size()
. stack_maxrandom_size() is ~16GB (or ~4GB if the kernel is vulnerable to CVE-2015-1593, but we do not consider this case here)
. arch_mmap_rnd() is a random variable in the [0B,1TB] range
- the end of the stack region is equal to (as calculated by randomize_stack_top() in fs/binfmt_elf.c):
stack_end = TASK_SIZE - "stack_rand"
where:
. "stack_rand" is a random variable in the [0, stack_maxrandom_size()] range
- the initial mmap-stack distance is therefore equal to:
stack_end - mmap_end = MIN_GAP + arch_mmap_rnd() - "stack_rand"
= 128MB + stack_maxrandom_size() - "stack_rand" + arch_mmap_rnd()
= 128MB + StackRand + MmapRand
where:
. StackRand = stack_maxrandom_size() - "stack_rand", a random variable in the [0B,16GB] range
. MmapRand = arch_mmap_rnd(), a random variable in the [0B,1TB] range
Consequently, the minimum initial mmap-stack distance is only 128MB (CVE-2017-1000379), and:
-
On kernels vulnerable to offset2lib, the heap of a PIE (which is mapped at the end of the mmap region) is mapped below and close to the stack with a good probability (~1/700). We can therefore clash the stack with the heap in Step 1, jump over the stack guard-page and into the heap in Step 3, and smash the stack with the heap and gain control of rip in Step 4a (after 6 hours on average). However, because the addresses of all executable regions contain null-bytes, and because most of our stack-smashes in Step 4a are string operations (except the getaddrinfo() method), we were unable to transform such a rip control into arbitrary code execution.
-
On all kernels, either a PIE or ld.so is mapped directly below the stack with a good probability (~1/17000) -- the end of the PIE's or ld.so's read-write segment is then equal to the start of the stack guard-page. We can therefore adapt our ld.so "hwcap" exploit to amd64 and obtain root privileges through most SUID binaries on most Linux distributions (after 5 hours on average).
Kernels vulnerable to offset2lib, local Exim proof-of-concept
Exim's binary is usually a PIE, mapped at the end of the mmap region; and the heap, which always grows up and is randomized above the end of the binary, is therefore randomized above the end of the mmap region (arch_randomize_brk() in arch/x86/kernel/process.c):
heap_start = mmap_end + "heap_rand"
where "heap_rand" is a random variable in the [0B,32MB] range (negligible and ignored here). For example, on Debian 8.5:
cat /proc/"pidof -s /usr/sbin/exim4"/maps
... 7fa6410d6000-7fa6411c8000 r-xp 00000000 08:01 14574 /usr/sbin/exim4 7fa6413b4000-7fa6413bd000 rw-p 00000000 00:00 0 7fa6413c5000-7fa6413c7000 rw-p 00000000 00:00 0 7fa6413c7000-7fa6413c9000 r--p 000f1000 08:01 14574 /usr/sbin/exim4 7fa6413c9000-7fa6413d2000 rw-p 000f3000 08:01 14574 /usr/sbin/exim4 7fa6413d2000-7fa6413d7000 rw-p 00000000 00:00 0 7fa641b34000-7fa641b76000 rw-p 00000000 00:00 0 [heap] 7ffdf3e53000-7ffdf3ed6000 rw-p 00000000 00:00 0 [stack] 7ffdf3f3c000-7ffdf3f3e000 r-xp 00000000 00:00 0 [vdso] 7ffdf3f3e000-7ffdf3f40000 r--p 00000000 00:00 0 [vvar] ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsyscall]
To reach the start of the stack with the end of the heap (through the -p memory leak in Exim) in Step 1 of our stack-clash, we must minimize the initial heap-stack distance, and hence the initial mmap-stack distance, and set RLIMIT_STACK to MIN_GAP (~16GB). This limits the size of our -p argument strings on the stack to 16GB/4=4GB, and because we then leak the same amount of heap memory through -p, the initial heap-stack distance must be:
-
longer than 4GB (the stack must be able to contain the -p argument strings);
-
shorter than 8GB (the end of the heap must be able to reach the start of the stack during the -p memory leak).
The initial heap-stack distance (approximately the initial mmap-stack distance, 128MB + StackRand + MmapRand, but we ignore the 128MB term here) follows a trapezoidal Irwin-Hall distribution, and the [4GB,8GB] range is within the first non-uniform area of this trapezoid, so the probability that the initial heap-stack distance is in this range is:
SUM(d = 4GB; d < 8GB; d++) d / (16GB * 1TB)
= SUM(d = 0; d < 4GB; d++) (4GB + d) / (16GB * 1TB)
= SUM(d = 0; d < 2^32; d++) (2^32 + d) / (2^34 * 2^40)
~= ((2^32)(2^32) + (2^32)(2^32) / 2) / (2^74)
~= 3 / 2^11
~= 1 / 682
The probability of gaining rip control after the heap reaches the stack is ~1/16 (as calculated by a 64-bit version of the small helper program presented in IV.1.1.), and the final probability of gaining rip control with our local Exim proof-of-concept is:
(3 / 2^11) * (1/16) ~= 1 / 10922
On our 8GB Debian 8.7 test machine, this proof-of-concept takes roughly 2 seconds per run, and has a good chance of gaining rip control after 10922 * 2 seconds ~= 6 hours:
gdb /usr/sbin/exim4 core.6049
GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1 ... This GDB was configured as "x86_64-linux-gnu". Core was generated by `/usr/sbin/exim4 -p0000000000000000000000000000000000000000000000000000000000000'. Program terminated with signal SIGSEGV, Segmentation fault.
0 __memcpy_sse2_unaligned () at ../sysdeps/x86_64/multiarch/memcpy-sse2-unaligned.S:41
41 ../sysdeps/x86_64/multiarch/memcpy-sse2-unaligned.S: No such file or directory. (gdb) x/i $rip => 0x7ffab1be7061 <__memcpy_sse2_unaligned+65>: retq (gdb) x/xg $rsp 0x7ffb9b294a48: 0x4141414141414141
Kernels vulnerable to offset2lib, ld.so ".dynamic" exploit
Since kernels vulnerable to offset2lib map PIEs below and close to the stack, we tried to adapt our ld.so ".dynamic" exploit to amd64. MIN_GAP guarantees a minimum distance of 128MB between the theoretical end of the mmap region and the end of the stack, but the stack then grows down to store the argument and environment strings, and may therefore occupy the theoretical end of the mmap region (where nothing has been mapped yet). Consequently, the end of the mmap region (where the PIE will be mapped) slides down to the first available address, directly below the stack guard-page and the initial stack expansion (described in II.3.2.):
7ffbb7e51000-7ffbb7e53000 r-xp 00000000 fd:03 4465810 /tmp/test64 ... 7ffbb8053000-7ffbb808c000 rw-p 00002000 fd:03 4465810 /tmp/test64 7ffbb808d000-7ffc180ae000 rw-p 00000000 00:00 0 [heap] ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsyscall]
Note: in this example, the "[stack]" is, again, incorrectly displayed as the "[heap]" by show_map_vma() (in fs/proc/task_mmu.c).
This layout is ideal for our stack-clash exploits, but poses an unexpected problem: because the PIE is mapped directly below the stack, the stack cannot grow anymore, and the only free stack space is the initial stack expansion (128KB) minus the argv[] and envp[] pointers (which are stored there, as mentioned in II.3.2.):
-
on the one hand, many argv[] and envp[] pointers, and hence many argument and environment strings, result in a higher probability of mapping the PIE directly below the stack;
-
on the other hand, many argv[] and envp[] pointers consume most of the initial stack expansion and do not leave enough free stack space for ld.so to operate.
In practice, we pass 96KB of argv[] pointers to execve(), thus leaving 32KB of free stack space for ld.so, and since the size of a pointer is 8B, and the maximum size of an argument string is 128KB, we also pass 96KB/8B*128KB=1.5GB of argument strings to execve(). The resulting probability of mapping the PIE directly below the stack is:
SUM(s = 0; s < 1.5GB - 128MB; s++) s / (16GB * 1TB)
~= ((1.5GB - 128MB)^2 / 2) / (16GB * 1TB)
~= 1 / 17331
On a 4GB Virtual Machine, each run takes 1 second, and 17331 runs take roughly 5 hours. But we cannot add more uncertainty to this exploit, and because of the problems discussed in IV.1.4. (null-bytes in DT_NEEDED, but also in DT_AUXILIARY on 64-bit, etc), we were unable to overwrite the .dynamic section with a pattern that does not significantly decrease this exploit's probability of success.
All kernels, ld.so "hwcap" exploit
Despite this failure, we had an intuition: when the PIE is mapped directly below the stack, the stack layout should be deterministic -- rsp should point into the 128KB of initial stack expansion, at a 32KB offset above the start of the stack, and the only entropy should be the 8KB of sub-page randomization within the stack (arch_align_stack() in arch/x86/kernel/process.c). The following output of our small test program confirmed this intuition (the fourth field is the distance between the start of the stack and our main()'s rsp when the PIE is mapped directly below the stack):
$ grep -w sp test64.out | sort -nk4 sp 0x7ffbc271ff38 -> 28472 sp 0x7ffbb95ccff8 -> 28664 sp 0x7ffbaf062678 -> 30328 sp 0x7ffbb08736e8 -> 30440 sp 0x7ffbbc616d18 -> 32024 sp 0x7ffbc1a0fdb8 -> 32184 sp 0x7ffbb9c28ff8 -> 32760 sp 0x7ffbdbf4c178 -> 33144 sp 0x7ffbb39bc1c8 -> 33224 sp 0x7ffbebb86838 -> 34872
Surprisingly, the output of this test program contained additional valuable information:
7ffbb7e51000-7ffbb7e53000 r-xp 00000000 fd:03 4465810 /tmp/test64 7ffbb8034000-7ffbb8037000 rw-p 00000000 00:00 0 7ffbb804d000-7ffbb804e000 rw-p 00000000 00:00 0 7ffbb804e000-7ffbb8050000 r--p 00000000 00:00 0 [vvar] 7ffbb8050000-7ffbb8052000 r-xp 00000000 00:00 0 [vdso] 7ffbb8052000-7ffbb8053000 r--p 00001000 fd:03 4465810 /tmp/test64 7ffbb8053000-7ffbb808c000 rw-p 00002000 fd:03 4465810 /tmp/test64 7ffbb808d000-7ffc180ae000 rw-p 00000000 00:00 0 [heap] ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsyscall]
- the distance between the end of the read-execute segment of our test program and the start of its read-only and read-write segments is approximately 2MB; indeed, for every ELF on amd64:
$ readelf -a /usr/bin/su | grep -wA1 LOAD LOAD 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x00000000000061b4 0x00000000000061b4 R E 200000 LOAD 0x0000000000006888 0x0000000000206888 0x0000000000206888 0x0000000000000798 0x00000000000007d0 RW 200000
$ readelf -a /lib64/ld-linux-x86-64.so.2 | grep -wA1 LOAD LOAD 0x0000000000000000 0x0000000000000000 0x0000000000000000 0x000000000001fad0 0x000000000001fad0 R E 200000 LOAD 0x000000000001fb60 0x000000000021fb60 0x000000000021fb60 0x000000000000141c 0x00000000000015e8 RW 200000
- several objects are actually mapped inside this ~2MB hole: [vdso], [vvar], and two anonymous mappings (7ffbb804d000-7ffbb804e000 and 7ffbb8034000-7ffbb8037000).
This discovery allowed us to adapt our ld.so "hwcap" exploit to amd64:
-
we choose hardware-capabilities that are small enough to be mapped inside this ~2MB hole, but large enough to defeat the 8KB sub-page randomization of the stack;
-
we jump over the stack guard-page, and over the read-only and read-write segments of the PIE, and exploit ld.so as we did on i386.
This exploit's probability of success is therefore 1 when the PIE is mapped directly below the stack, and its final probability of success is ~1/17331: it takes 1 second per run, and has a good chance of obtaining a root-shell after 5 hours. Moreover, it works on all kernels: if a SUID binary is not a PIE, or if the kernel is not vulnerable to offset2lib, we simply jump over ld.so's read-write segment, instead of the PIE's. For example, on Fedora 25, when the exploit succeeds and loads our own library /var/tmp/a (the 7ffbabbef000-7ffbabca7000 mapping contains the hardware-capabilities that we smash):
55a0c9e8d000-55a0c9e91000 r-xp 00000000 fd:00 112767 /usr/libexec/cockpit-polkit 55a0ca091000-55a0ca093000 rw-p 00004000 fd:00 112767 /usr/libexec/cockpit-polkit 7ffbab603000-7ffbab604000 r-xp 00000000 fd:00 4866583 /var/tmp/a 7ffbab604000-7ffbab803000 ---p 00001000 fd:00 4866583 /var/tmp/a 7ffbab803000-7ffbab804000 r--p 00000000 fd:00 4866583 /var/tmp/a 7ffbab804000-7ffbaba86000 rw-p 00000000 00:00 0 7ffbaba86000-7ffbabaab000 r-xp 00000000 fd:00 4229637 /usr/lib64/ld-2.24.so 7ffbabbef000-7ffbabca7000 rw-p 00000000 00:00 0 7ffbabca7000-7ffbabca9000 r--p 00000000 00:00 0 [vvar] 7ffbabca9000-7ffbabcab000 r-xp 00000000 00:00 0 [vdso] 7ffbabcab000-7ffbabcad000 rw-p 00025000 fd:00 4229637 /usr/lib64/ld-2.24.so 7ffbabcad000-7ffbabcae000 rw-p 00000000 00:00 0 7ffbabcaf000-7ffc0bcf0000 rw-p 00000000 00:00 0 [stack] ffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsyscall]
======================================================================== IV.2. OpenBSD ========================================================================
======================================================================== IV.2.1. Maximum RLIMIT_STACK vulnerability (CVE-2017-1000372) ========================================================================
The OpenBSD kernel limits the maximum size of the user-space stack (RLIMIT_STACK) to MAXSSIZ (32MB); the execve() system-call allocates a MAXSSIZ memory region for the stack and divides it in two:
-
the second part, effectively the user-space stack, is mapped PROT_READ|PROT_WRITE at the end of this stack memory region, and occupies RLIMIT_STACK bytes (by default 8MB for root processes, and 4MB for user processes);
-
the first part, effectively a large stack guard-page, is mapped PROT_NONE at the start of this stack memory region, and occupies MAXSSIZ - RLIMIT_STACK bytes.
Unfortunately, we discovered that if an attacker sets RLIMIT_STACK to MAXSSIZ, he eliminates the PROT_NONE part of the stack region, and hence the stack guard-page itself (CVE-2017-1000372). For example:
sh -c 'ulimit -S -s; procmap -a -P'
8192 Start End Size Offset rwxpc RWX I/W/A Dev Inode - File ... 14cf6000-14cfafff 20k 00000000 r-xp+ (rwx) 1/0/0 00:03 52375 - /usr/sbin/procmap [0xdb29ce10] ... 84a7b000-84a7bfff 4k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ anon ] cd7db000-cefdafff 24576k 00000000 ---p+ (rwx) 1/0/0 00:00 0 - [ stack ] cefdb000-cf7cffff 8148k 00000000 rw-p+ (rwx) 1/0/0 00:00 0 - [ stack ] cf7d0000-cf7dafff 44k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ stack ] total 10348k
sh -c 'ulimit -S -s ulimit -H -s; procmap -a -P'
Start End Size Offset rwxpc RWX I/W/A Dev Inode - File ... 1a47f000-1a483fff 20k 00000000 r-xp+ (rwx) 1/0/0 00:03 52375 - /usr/sbin/procmap [0xdb29ce10] ... 8a3c8000-8a3c9fff 8k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ anon ] cd7c9000-cf7bffff 32732k 00000000 rw-p+ (rwx) 1/0/0 00:00 0 - [ stack ] cf7c0000-cf7c8fff 36k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ stack ] total 33992k
A remote attacker cannot exploit this vulnerability, because he cannot modify RLIMIT_STACK; but a local attacker can set RLIMIT_STACK to MAXSSIZ, and:
-
Step 1: malloc()ate almost 2GB of heap memory, until the heap reaches the start of the stack region;
-
Steps 2 and 3: consume MAXSSIZ (32MB) of stack memory, until the stack-pointer reaches the start of the stack region (Step 2) and moves into the heap (Step 3);
-
Step 4: smash the stack with the heap (Step 4a) or smash the heap with the stack (Step 4b).
======================================================================== IV.2.2. Recursive qsort() vulnerability (CVE-2017-1000373) ========================================================================
To complete Step 2, a recursive function is needed, and the first possibly recursive function that we investigated is qsort(). On the one hand, glibc's _quicksort() function (in stdlib/qsort.c) is non-recursive (iterative): it uses a small, specialized stack of partition structures (two pointers, low and high), and guarantees that no more than 32 partitions (on i386) or 64 partitions (on amd64) are pushed onto this stack, because it always pushes the larger of two sub-partitions and iterates on the smaller partition.
On the other hand, BSD's qsort() function is recursive: it always recurses on the first sub-partition, and iterates on the second sub-partition; but instead, it should always recurse on the smaller sub-partition, and iterate on the larger sub-partition (CVE-2017-1000373 in OpenBSD, CVE-2017-1000378 in NetBSD, and CVE-2017-1082 in FreeBSD).
In theory, because BSD's qsort() is not randomized, an attacker can construct a pathological input array of N elements that causes qsort() to deterministically recurse N times. In practice, because this qsort() uses the median-of-three medians-of-three selection of a pivot element (the "ninther"), our attack constructs an input array of N elements that causes qsort() to recurse N/4 times.
======================================================================== IV.2.3. /usr/bin/at proof-of-concept ========================================================================
/usr/bin/at is SGID-crontab (which can be escalated to full root privileges) because it must be able to create ("at -t"), list ("at -l"), and remove ("at -r") job-files in the /var/cron/atjobs directory:
-r-xr-sr-x 4 root crontab 31376 Jul 26 2016 /usr/bin/at drwxrwx--T 2 root crontab 512 Jul 26 2016 /var/cron/atjobs
To demonstrate that OpenBSD's RLIMIT_STACK and qsort() vulnerabilities can be transformed into powerful primitives such as heap corruption, we developed a proof-of-concept against "at -l" (the list_jobs() function):
-
Step 1 (Clash): first, list_jobs() malloc()ates an atjob structure for each file in /var/cron/atjobs -- if we create 40M job-files, then the heap reaches the stack, but we do not exhaust the address-space;
-
Steps 2 and 3 (Run and Jump): second, list_jobs() qsort()s the malloc()ated jobs -- if we construct their time-stamps with our qsort() attack, then we can cause qsort() to recurse 40M/4=10M times and consume at least 10M*4B=40MB of stack memory (each recursive call to qsort() consumes at least 4B, the return-address) and move the stack-pointer into the heap;
-
Step 4b (Smash the heap with the stack): last, list_jobs() free()s the malloc()ated jobs, and abort()s with an error message -- OpenBSD's hardened malloc() implementation detects that the heap has been corrupted by the last recursive calls to qsort().
This naive version of our /usr/bin/at proof-of-concept poses two major problems:
- Our pathological input array of N=40M elements cannot be sorted (Step 2 never finishes because it exhibits qsort()'s worst-case behavior, N^2). To solve this problem, we divide the input array in two:
. the first, pathological part contains only n=(33MB/176B)4=768K elements that are needed to complete Steps 2 and 3, and cause qsort() to recurse n/4 times and consume (n/4)176B=33MB of stack memory (MAXSSIZ+1MB) as each recursive call to qsort() consumes 176B of stack memory;
. the second, innocuous part contains the remaining N-n=39M elements that are needed to complete Step 1, but not Steps 2 and 3, and are therefore swapped into the second, iterative partition of the first recursive call to qsort().
- We were unable to create 40M files in /var/cron/atjobs: after one week, OpenBSD's default filesystem (ffs) had created only 4M files, and the rate of file creation had dropped from 25 files/second to 4 files/second. We did not solve this problem, but nevertheless wanted to validate our proof-of-concept:
. we transformed it into an LD_PRELOAD library that intercepts calls to readdir() and fstatat(), and pretends that our 40M files in /var/cron/atjobs exist;
. we made /var/cron/atjobs world-readable and LD_PRELOADed our library into a non-SGID copy of /usr/bin/at;
. after about an hour, "at" reports random heap corruptions:
chmod o+r /var/cron/atjobs
chmod o+r /var/cron/at.deny
$ ulimit -c 0
$ ulimit -S -d ulimit -H -d
$ ulimit -S -s ulimit -H -s
$ ulimit -S -a
...
coredump(blocks) 0
data(kbytes) 3145728
stack(kbytes) 32768
...
$ cp /usr/bin/at .
$ LD_PRELOAD=./OpenBSD_at.so ./at -l -v -q x > /dev/null initializing jobkeys finalizing jobkeys reading jobs 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% sorting jobs at(78717) in free(): error: chunk info corrupted Abort trap
$ LD_PRELOAD=./OpenBSD_at.so ./at -l -v -q x > /dev/null initializing jobkeys finalizing jobkeys reading jobs 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% sorting jobs at(14184) in free(): error: modified chunk-pointer 0xcd6d0120 Abort trap
======================================================================== IV.3. NetBSD ========================================================================
Like OpenBSD, NetBSD is vulnerable to the maximum RLIMIT_STACK vulnerability (CVE-2017-1000374): if a local attacker sets RLIMIT_STACK to MAXSSIZ, he eliminates the PROT_NONE part of the stack region -- the stack guard-page itself. Unlike OpenBSD, however, NetBSD:
-
defines MAXSSIZ to 64MB on i386 (128MB on amd64);
-
maps the run-time link-editor ld.so directly below the stack region, even if ASLR is enabled (CVE-2017-1000375):
$ sh -c 'ulimit -S -s; pmap -a -P' 2048 Start End Size Offset rwxpc RWX I/W/A Dev Inode - File 08048000-0804dfff 24k 00000000 r-xp+ (rwx) 1/0/0 00:00 21706 - /usr/bin/pmap [0xc5c8f0b8] ... bbbee000-bbbfefff 68k 00000000 r-xp+ (rwx) 1/0/0 00:00 107525 - /libexec/ld.elf_so [0xc535f580] bbbff000-bbbfffff 4k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ anon ] bbc00000-bf9fffff 63488k 00000000 ---p+ (rwx) 1/0/0 00:00 0 - [ stack ] bfa00000-bfbeffff 1984k 00000000 rw-p+ (rwx) 1/0/0 00:00 0 - [ stack ] bfbf0000-bfbfffff 64k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ stack ] total 9528k
$ sh -c 'ulimit -S -s ulimit -H -s; pmap -a -P'
Start End Size Offset rwxpc RWX I/W/A Dev Inode - File
08048000-0804dfff 24k 00000000 r-xp+ (rwx) 1/0/0 00:00 21706 - /usr/bin/pmap [0xc5c8f0b8]
...
bbbee000-bbbfefff 68k 00000000 r-xp+ (rwx) 1/0/0 00:00 107525 - /libexec/ld.elf_so [0xc535f580]
bbbff000-bbbfffff 4k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ anon ]
bbc00000-bfbeffff 65472k 00000000 rw-p+ (rwx) 1/0/0 00:00 0 - [ stack ]
bfbf0000-bfbfffff 64k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ stack ]
total 73016k
cp /usr/bin/pmap .
paxctl +A ./pmap
sh -c 'ulimit -S -s ulimit -H -s; ./pmap -a -P'
Start End Size Offset rwxpc RWX I/W/A Dev Inode - File 08048000-0804dfff 24k 00000000 r-xp+ (rwx) 1/0/0 00:00 172149 - /tmp/pmap [0xc5cb3c64] ... bbbee000-bbbfefff 68k 00000000 r-xp+ (rwx) 1/0/0 00:00 107525 - /libexec/ld.elf_so [0xc535f580] bbbff000-bbbfffff 4k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ anon ] bbc00000-bf1bffff 55040k 00000000 rw-p+ (rwx) 1/0/0 00:00 0 - [ stack ] bf1c0000-bf1cefff 60k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ stack ] total 62580k
Consequently, a local attacker can set RLIMIT_STACK to MAXSSIZ, eliminate the stack guard-page, and:
-
skip Step 1, because ld.so's read-write segment is naturally mapped directly below the stack region;
-
Steps 2 and 3: consume 64MB (MAXSSIZ) of stack memory (for example, through the recursive qsort() vulnerability, CVE-2017-1000378) until the stack-pointer reaches the start of the stack region (Step 2) and moves into ld.so's read-write segment (Step 3);
-
Step 4b: smash ld.so's read-write segment with the stack.
We did not try to exploit this vulnerability, nor did we search for a vulnerable SUID or SGID binary, but we wrote a simple proof-of-concept, and some of the following crashes may be exploitable:
$ sh -c 'ulimit -S -s ulimit -H -s; ./NetBSD_CVE-2017-1000375 0x04000000'
[1] Segmentation fault ./NetBSD_CVE-201...
$ sh -c 'ulimit -S -s ulimit -H -s; ./NetBSD_CVE-2017-1000375 0x03000000'
...
$ sh -c 'ulimit -S -s ulimit -H -s; ./NetBSD_CVE-2017-1000375 0x03ec5000'
$ sh -c 'ulimit -S -s ulimit -H -s; ./NetBSD_CVE-2017-1000375 0x03ec5400'
[1] Segmentation fault ./NetBSD_CVE-201...
$ sh -c 'ulimit -S -s ulimit -H -s; gdb ./NetBSD_CVE-2017-1000375'
GNU gdb (GDB) 7.7.1
...
(gdb) run 0x03ec5400
Program received signal SIGSEGV, Segmentation fault.
0xbbbf448d in _rtld_symlook_default () from /usr/libexec/ld.elf_so
(gdb) x/i $eip
=> 0xbbbf448d <_rtld_symlook_default+185>: mov %edx,(%esi,%edi,4)
(gdb) info registers
esi 0xbabae890 -1162155888
edi 0x0 0
...
(gdb) run 0x03ec5800
Program received signal SIGSEGV, Segmentation fault.
0xbbbf4465 in _rtld_symlook_default () from /usr/libexec/ld.elf_so
(gdb) x/i $eip
=> 0xbbbf4465 <_rtld_symlook_default+145>: mov 0x4(%ecx),%edx
(gdb) info registers
ecx 0x41414141 1094795585
...
(gdb) run 0x03ec5c00
Program received signal SIGSEGV, Segmentation fault.
0xbbbf4408 in _rtld_symlook_default () from /usr/libexec/ld.elf_so
(gdb) x/i $eip
=> 0xbbbf4408 <_rtld_symlook_default+52>: mov (%eax),%esi
(gdb) info registers
eax 0x41414141 1094795585
...
======================================================================== IV.4. FreeBSD ========================================================================
======================================================================== IV.4.1. setrlimit() RLIMIT_STACK vulnerability (CVE-2017-1085) ========================================================================
FreeBSD's kern_proc_setrlimit() function contains the following comment and code:
/*
* Stack is allocated to the max at exec time with only
* "rlim_cur" bytes accessible. If stack limit is going
* up make more accessible, if going down make inaccessible.
*/
if (limp->rlim_cur != oldssiz.rlim_cur) {
...
if (limp->rlim_cur > oldssiz.rlim_cur) {
prot = p->p_sysent->sv_stackprot;
size = limp->rlim_cur - oldssiz.rlim_cur;
addr = p->p_sysent->sv_usrstack -
limp->rlim_cur;
} else {
prot = VM_PROT_NONE;
size = oldssiz.rlim_cur - limp->rlim_cur;
addr = p->p_sysent->sv_usrstack -
oldssiz.rlim_cur;
}
...
(void)vm_map_protect(&p->p_vmspace->vm_map,
addr, addr + size, prot, FALSE);
}
OpenBSD's and NetBSD's dosetrlimit() function contains the same comment, which accurately describes the layout of their user-space stack region. Unfortunately, FreeBSD's kern_proc_setrlimit() comment and code are incorrect, as hinted at in exec_new_vmspace():
/ * Destroy old address space, and allocate a new stack * The new stack is only SGROWSIZ large because it is grown * automatically in trap.c. /
and vm_map_stack_locked():
/*
* We initially map a stack of only init_ssize. We will grow as
* needed later.
where init_ssize is SGROWSIZ (128KB), not MAXSSIZ (64MB on i386), because "init_ssize = (max_ssize < growsize) ? max_ssize : growsize;" (and max_ssize is MAXSSIZ, and growsize is SGROWSIZ).
As a result, if a program calls setrlimit() to increase RLIMIT_STACK, vm_map_protect() may turn a read-only memory region below the stack into a read-write region (CVE-2017-1085), as demonstrated by the following proof-of-concept:
% ./FreeBSD_CVE-2017-1085 Segmentation fault
% ./FreeBSD_CVE-2017-1085 setrlimit to the max char at 0xbd155000: 41
======================================================================== IV.4.2. Stack guard-page disabled by default (CVE-2017-1083) ========================================================================
The FreeBSD kernel implements a 4KB stack guard-page, and recent versions of the FreeBSD Installer offer it as a system hardening option. Unfortunately, it is disabled by default (CVE-2017-1083):
% sysctl security.bsd.stack_guard_page security.bsd.stack_guard_page: 0
======================================================================== IV.4.3. Stack guard-page vulnerabilities (CVE-2017-1084) ========================================================================
- If FreeBSD's stack guard-page is enabled, its entire logic is implemented in vm_map_growstack(): this function guarantees a minimum distance of 4KB (the stack guard-page) between the start of the stack and the end of the memory region that is mapped below (but the stack guard-page is not physically mapped into the address-space).
Unfortunately, this guarantee is given only when the stack grows down and clashes with the memory region mapped below, but not if the memory region mapped below grows up and clashes with the stack: this vulnerability effectively eliminates the stack guard-page (CVE-2017-1084). In our proof-of-concept:
. we allocate anonymous mmap()s of 4KB, until the end of an anonymous mmap() reaches the start of the stack [Step 1];
. we call a recursive function until the stack-pointer reaches the start of the stack and moves into the anonymous mmap() directly below [Step 2];
. but we do not jump over the stack guard-page, because each call to the recursive function allocates (and fully writes to) a 1KB stack-based buffer [Step 3];
. and we do not crash into the stack guard-page, because CVE-2017-1084 has effectively eliminated the stack guard-page in Step 1.
sysctl security.bsd.stack_guard_page=1
security.bsd.stack_guard_page: 0 -> 1
% ./FreeBSD_CVE-2017-FGPU char at 0xbfbde000: 41
- vm_map_growstack() implements most of the stack guard-page logic in
the following code:
/* * Growing downward. */ /* Get the preliminary new entry start value */ addr = stack_entry->start - grow_amount; /* * If this puts us into the previous entry, cut back our * growth to the available space. Also, see the note above. */ if (addr < end) { stack_entry->avail_ssize = max_grow; addr = end; if (stack_guard_page) addr += PAGE_SIZE; }
where:
. addr is the new start of the stack;
. stack_entry->start is the old start of the stack;
. grow_amount is the size of the stack expansion;
. end is the end of the memory region below the stack.
Unfortunately, the "addr < end" test should be "addr <= end": if addr, the new start of the stack, is equal to end, the end of the memory region mapped below, then the stack guard-page is eliminated (CVE-2017-1084). In our proof-of-concept:
. we allocate anonymous mmap()s of 4KB, until the end of an anonymous mmap() reaches a randomly chosen distance below the start of the stack [Step 1];
. we call a recursive function until the stack-pointer reaches the start of the stack, and the stack expansion reaches the end of the anonymous mmap() below [Step 2];
. we do not jump over the stack guard-page, because each call to the recursive function allocates (and fully writes to) a 1KB stack-based buffer [Step 3];
. and we crash into the stack guard-page most of the time;
. but we survive with a probability of 4KB/128KB=1/32 (grow_amount is always a multiple of SGROWSIZ, 128KB) because CVE-2017-1084 has effectively eliminated the stack guard-page in Step 2.
% sysctl security.bsd.stack_guard_page security.bsd.stack_guard_page: 1
% sh -c 'while true; do ./FreeBSD_CVE-2017-FGPE; done' Segmentation fault char at 0xbe45e000: 41; final dist 6097 (24778705) Segmentation fault Segmentation fault Segmentation fault ... Segmentation fault Segmentation fault Segmentation fault char at 0xbd25e000: 41; final dist 7036 (43654012) Segmentation fault Segmentation fault Segmentation fault ... Segmentation fault Segmentation fault Segmentation fault char at 0xbd29e000: 41; final dist 5331 (43390163) Segmentation fault Segmentation fault Segmentation fault ...
In contrast, if FreeBSD's stack guard-page is disabled, our proof-of-concept always survives:
sysctl security.bsd.stack_guard_page=0
security.bsd.stack_guard_page: 1 -> 0
% sh -c 'while true; do ./FreeBSD_CVE-2017-FGPE; done' char at 0xbe969000: 41; final dist 89894 (19488550) char at 0xbfa6d000: 41; final dist 74525 (1647389) char at 0xbf4df000: 41; final dist 78 (7471182) char at 0xbe9e4000: 41; final dist 112397 (18986765) char at 0xbf693000: 41; final dist 49811 (5685907) char at 0xbf533000: 41; final dist 51037 (7128925) char at 0xbd799000: 41; final dist 26043 (38167995) char at 0xbd54b000: 11; final dist 83754 (40585002) char at 0xbe176000: 41; final dist 36992 (27824256) char at 0xbfa91000: 41; final dist 57449 (1499241) char at 0xbd1b9000: 41; final dist 26115 (44328451) char at 0xbd1c8000: 41; final dist 94852 (44266116) char at 0xbf73a000: 41; final dist 22276 (5003012) char at 0xbe6b1000: 41; final dist 58854 (22341094) char at 0xbeb81000: 41; final dist 124727 (17295159) char at 0xbfb35000: 41; final dist 43174 (829606) ...
- FreeBSD's thread library (libthr) mmap()s a secondary PROT_NONE stack guard-page at a distance RLIMIT_STACK below the end of the stack:
sysctl security.bsd.stack_guard_page=1
security.bsd.stack_guard_page: 0 -> 1
% sh -c 'exec procstat -v $$' PID START END PRT RES PRES REF SHD FLAG TP PATH 2779 0x8048000 0x8050000 r-x 8 8 1 0 CN-- vn /usr/bin/procstat ... 2779 0x28400000 0x28800000 rw- 22 35 2 0 ---- df 2779 0xbfbdf000 0xbfbff000 rwx 3 3 1 0 ---D df 2779 0xbfbff000 0xbfc00000 r-x 1 1 23 0 ---- ph
% sh -c 'LD_PRELOAD=libthr.so exec procstat -v $$' PID START END PRT RES PRES REF SHD FLAG TP PATH 2798 0x8048000 0x8050000 r-x 8 8 1 0 CN-- vn /usr/bin/procstat ... 2798 0x28400000 0x28800000 rw- 23 35 2 0 ---- df 2798 0xbbbfe000 0xbbbff000 --- 0 0 0 0 ---- -- 2798 0xbfbdf000 0xbfbff000 rwx 3 3 1 0 ---D df 2798 0xbfbff000 0xbfc00000 r-x 1 1 23 0 ---- ph
Unfortunately, this secondary stack guard-page does not mitigate the vulnerabilities that we discovered in FreeBSD's stack guard-page implementation:
% sysctl security.bsd.stack_guard_page security.bsd.stack_guard_page: 1
% sh -c 'LD_PRELOAD=libthr.so ./FreeBSD_CVE-2017-FGPU' char at 0xbfbde000: 41
% sh -c 'while true; do LD_PRELOAD=libthr.so ./FreeBSD_CVE-2017-FGPE; done' Segmentation fault Segmentation fault Segmentation fault ... Segmentation fault Segmentation fault Segmentation fault char at 0xbda5e000: 41; final dist 3839 (35262207) Segmentation fault Segmentation fault Segmentation fault ... Segmentation fault Segmentation fault Segmentation fault char at 0xbdb1e000: 41; final dist 3549 (34475485) Segmentation fault Segmentation fault Segmentation fault ...
======================================================================== IV.4.4. Remote exploitation ========================================================================
Because FreeBSD's stack guard-page is disabled by default, we tried (and failed) to remotely exploit a test service vulnerable to:
-
an unlimited memory leak that allows us to malloc()ate gigabytes of memory;
-
a limited recursion that allows us to allocate up to 1MB of stack memory.
FreeBSD's malloc() implementation (jemalloc) mmap()s 4MB chunks of anonymous memory that are aligned on multiples of 4MB. The first 4MB mmap() chunk starts at 0x28400000, and the last 4MB mmap() chunk ends at 0xbf800000, because the stack itself already ends at 0xbfc00000; but it is impossible to cover this final mmap-stack distance (almost 4MB) with the limited recursion (1MB) of our test service. break(0x80499b0) = 0 (0x0) break(0x8400000) = 0 (0x0) mmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = 672845824 (0x281ad000) mmap(0x285ad000,2437120,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = 677040128 (0x285ad000) munmap(0x281ad000,2437120) = 0 (0x0) mmap(0x0,8388608,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = 679477248 (0x28800000) munmap(0x28c00000,4194304) = 0 (0x0) mmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = 683671552 (0x28c00000) mmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = 687865856 (0x29000000) mmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = 692060160 (0x29400000) mmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = 696254464 (0x29800000) mmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = 700448768 (0x29c00000) ... mmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = -1103101952 (0xbe400000) mmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = -1098907648 (0xbe800000) mmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = -1094713344 (0xbec00000) mmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = -1090519040 (0xbf000000) mmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = -1086324736 (0xbf400000) mmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) ERR#12 'Cannot allocate memory' break(0x8800000) = 0 (0x0) mmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) ERR#12 'Cannot allocate memory' break(0x8c00000) = 0 (0x0) mmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) ERR#12 'Cannot allocate memory' break(0x9000000) = 0 (0x0) ... mmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) ERR#12 'Cannot allocate memory' break(0x27c00000) = 0 (0x0) mmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) ERR#12 'Cannot allocate memory' break(0x28000000) = 0 (0x0) mmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) ERR#12 'Cannot allocate memory' break(0x28400000) ERR#12 'Cannot allocate memory'
======================================================================== IV.5. Solaris >= 11.1 ========================================================================
======================================================================== IV.5.1. Minimal RLIMIT_STACK vulnerability (CVE-2017-3630) ========================================================================
On Solaris, ASLR can be enabled or disabled for each ELF binary with the SUNW_ASLR dynamic section entry (man elfedit):
$ elfdump /usr/bin/rsh | egrep 'ASLR|NX' [39] SUNW_ASLR 0x2 ENABLE [40] SUNW_NXHEAP 0x2 ENABLE [41] SUNW_NXSTACK 0x2 ENABLE
Without ASLR
If ASLR is disabled:
-
a stack region of size RLIMIT_STACK is reserved in the address-space;
-
a 4KB stack guard-page is mapped directly below this stack region;
-
the runtime linker ld.so is mapped directly below this stack guard-page.
$ cp /usr/bin/sleep . $ chmod u+w ./sleep $ elfedit -e 'dyn:sunw_aslr disable' ./sleep
$ sh -c 'ulimit -S -s; ./sleep 3 & pmap -r ${!}' 8192 7176: ./sleep 3 ... FE7B1000 228K r-x---- /lib/ld.so.1 FE7FA000 8K rwx---- /lib/ld.so.1 FE7FC000 8K rwx---- /lib/ld.so.1 FE7FF000 8192K rw----- [ stack ] total 17148K
$ sh -c 'ulimit -S -s 64; ./sleep 3 & pmap -r ${!}' 7244: ./sleep 3 ... FEFA1000 228K r-x---- /lib/ld.so.1 FEFEA000 8K rwx---- /lib/ld.so.1 FEFEC000 8K rwx---- /lib/ld.so.1 FEFEF000 64K rw----- [ stack ] total 9020K
On the one hand, a local attacker can exploit this simplified stack-clash:
-
Step 1 (Clash) is not needed, because ld.so is naturally mapped directly below the stack (the distance between the end of ld.so's read-write segment and the start of the stack is 4KB, the stack guard-page);
-
Step 2 (Run) is not needed, because a local attacker can set RLIMIT_STACK to just a few kilobytes, reserve a very small stack region, and hence shorten the distance between the stack-pointer and the start of the stack (and the end of ld.so's read-write segment);
-
Step 3 (Jump) can be completed with a large stack-based buffer that is not fully written to;
-
Step 4b (Smash) can be completed by overwriting the function pointers in ld.so's read-write segment with the contents of a stack-based buffer.
Such a simplified stack-clash exploit was first mentioned in Gael Delalleau's 2005 presentation (slide 30).
On the other hand, a remote attacker cannot modify RLIMIT_STACK and must complete Step 2 (Run) with a recursive function that consumes the 8MB (the default RLIMIT_STACK) between the stack-pointer and the start of the stack.
With ASLR
If ASLR is enabled:
-
a stack region of size RLIMIT_STACK is reserved in the address-space;
-
a 4KB stack guard-page is mapped directly below this stack region;
-
the runtime linker ld.so is mapped below this stack guard-page, but at a random distance (within a [4KB,128MB] range) -- effectively a large, secondary stack guard-page.
On the one hand, a local attacker can run the simplified "Without ASLR" stack-clash exploit until the ld.so-stack distance is minimal -- with a probability of 4KB/128MB=1/32K, the distance between the end of ld.so's read-write segment and the start of the stack is exactly 8KB: the stack guard-page plus the minimum distance between the stack guard-page and ld.so (CVE-2017-3629).
On the other hand, a remote attacker must complete Step 2 (Run) with a recursive function, and:
-
has a good chance of exploiting this stack-clash after 32K connections (when the ld.so-stack distance is minimal) if the remote service re-execve()s (re-randomizes the ld.so-stack distance for each new connection);
-
cannot exploit this stack-clash if the remote service does not re-execve() (does not re-randomize the ld.so-stack distance for each new connection) unless the attacker is able to restart the service, reboot the server, or target a 32K-server farm.
======================================================================== IV.5.2. /usr/bin/rsh exploit ========================================================================
/usr/bin/rsh is SUID-root and its main() function allocates a 50KB stack-based buffer that is not written to and can be used to jump over the stack guard-page, into ld.so's read-write segment, in Step 3 of our simplified stack-clash exploit.
Next, we discovered a general method for gaining eip control in Step 4b: setlocale(LC_ALL, ""), called by the main() function of /usr/bin/rsh and other SUID binaries, copies the LC_ALL environment variable to several stack-based buffers and thus smashes ld.so's read-write segment and overwrites some of ld.so's function pointers.
Last, we execute our own shell-code: we return-into-binary (/usr/bin/rsh is not a PIE), to an instruction that reliably jumps into a copy of our LC_ALL environment variable in ld.so's read-write segment, which is in fact read-write-executable. For example, after we gain control of eip:
-
on Solaris 11.1, we return to a "pop; pop; ret" instruction, because a pointer to our shell-code is stored at an 8-byte offset from esp;
-
on Solaris 11.3, we return to a "call *0xc(%ebp)" instruction, because a pointer to our shell-code is stored at a 12-byte offset from ebp.
Our Solaris exploit brute-forces the random ld.so-stack distance and two parameters:
-
the RLIMIT_STACK;
-
the length of the LC_ALL environment variable.
======================================================================== IV.5.3. Forced-Privilege vulnerability (CVE-2017-3631) ========================================================================
/usr/bin/rsh is SUID-root, but the shell that we obtained in Step 4b of our stack-clash exploit did not grant us full root privileges, only net_privaddr, the privilege to bind to a privileged port number. Disappointed by this result, we investigated and found:
$ ggrep -r /usr/bin/rsh /etc 2>/dev/null /etc/security/exec_attr.d/core-os:Forced Privilege:solaris:cmd:RO::/usr/bin/rsh:privs=net_privaddr
$ /usr/bin/rsh -h /usr/bin/rsh: illegal option -- h usage: rsh [ -PN / -PO ] [ -l login ] [ -n ] [ -k realm ] [ -a ] [ -x ] [ -f / -F ] host command rsh [ -PN / -PO ] [ -l login ] [ -k realm ] [ -a ] [ -x ] [ -f / -F ] host
cat truss.out
... 7319: execve("/usr/bin/rsh", 0xA9479C548, 0xA94792808) argc = 2 7319: *** FPRIV: P/E: net_privaddr *** ...
Unfortunately, this Forced-Privilege protection is based on the pathname of SUID-root binaries, which can be execve()d through hard-links, under different pathnames (CVE-2017-3631). For example, we discovered that readable SUID-root binaries can be execve()d through hard-links in /proc:
$ sleep 3 < /usr/bin/rsh & /proc/${!}/fd/0 -h [1] 7333 /proc/7333/fd/0: illegal option -- h usage: rsh [ -PN / -PO ] [ -l login ] [ -n ] [ -k realm ] [ -a ] [ -x ] [ -f / -F ] host command rsh [ -PN / -PO ] [ -l login ] [ -k realm ] [ -a ] [ -x ] [ -f / -F ] host
cat truss.out
... 7335: execve("/proc/7333/fd/0", 0xA947CA508, 0xA94792808) argc = 2 7335: *** SUID: ruid/euid/suid = 100 / 0 / 0 *** ...
This vulnerability allows us to bypass the Forced-Privilege protection and obtain full root privileges with our /usr/bin/rsh exploit.
======================================================================== V. Acknowledgments ========================================================================
We thank the members of the distros list, Oracle/Solaris, Exim, Sudo, security@kernel.org, grsecurity/PaX, and OpenBSD. Description:
Red Hat Container Development Kit is a platform for developing containerized applicationsaaait is a set of tools that enables developers to quickly and easily set up an environment for developing and testing containerized applications on the Red Hat Enterprise Linux platform. An attacker could use this flaw to crash a server application compiled against the NSS library. Solution:
The References section of this erratum contains a link to download CDK 3.0.0-2 (you must log in to download the update). ========================================================================== Ubuntu Security Notice USN-3323-2 June 29, 2017
eglibc vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
Gnu C library could be made to run programs as an administrator.
Software Description: - eglibc: GNU C Library
Details:
USN-3323-1 fixed a vulnerability in the GNU C Library. This update provides the corresponding update for Ubuntu 12.04 ESM.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 ESM: libc6 2.15-0ubuntu10.20
After a standard system update you need to reboot your computer to make all the necessary changes
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201706-0334",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "linux enterprise software development kit",
"scope": "eq",
"trust": 1.6,
"vendor": "suse",
"version": "11.0"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 1.3,
"vendor": "redhat",
"version": "5"
},
{
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.6"
},
{
"model": "linux enterprise for sap",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "12"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "9.0"
},
{
"model": "web gateway",
"scope": "gte",
"trust": 1.0,
"vendor": "mcafee",
"version": "7.7.0.0"
},
{
"model": "glibc",
"scope": "lte",
"trust": 1.0,
"vendor": "gnu",
"version": "2.25"
},
{
"model": "enterprise linux server eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.5"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.2"
},
{
"model": "suse linux enterprise point of sale",
"scope": "eq",
"trust": 1.0,
"vendor": "novell",
"version": "11.0"
},
{
"model": "linux enterprise server",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "11"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.3"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.5"
},
{
"model": "suse linux enterprise desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "novell",
"version": "12.0"
},
{
"model": "linux enterprise server for raspberry pi",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "12"
},
{
"model": "linux enterprise software development kit",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "12.0"
},
{
"model": "suse linux enterprise server",
"scope": "eq",
"trust": 1.0,
"vendor": "novell",
"version": "11.0"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.6"
},
{
"model": "enterprise linux server eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.7"
},
{
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "leap",
"scope": "eq",
"trust": 1.0,
"vendor": "opensuse",
"version": "42.2"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.2"
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.6"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.3"
},
{
"model": "enterprise linux server eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.2"
},
{
"model": "enterprise linux server eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.3"
},
{
"model": "enterprise linux server long life",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.9"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.5"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.2"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.4"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.6"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "8.0"
},
{
"model": "enterprise linux server eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.5"
},
{
"model": "linux enterprise server",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "12"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.9"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.4"
},
{
"model": "enterprise linux server eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.2"
},
{
"model": "enterprise linux server eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.4"
},
{
"model": "web gateway",
"scope": "lte",
"trust": 1.0,
"vendor": "mcafee",
"version": "7.6.2.14"
},
{
"model": "linux enterprise server",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "10"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.6"
},
{
"model": "cloud magnum orchestration",
"scope": "eq",
"trust": 1.0,
"vendor": "openstack",
"version": "7"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "web gateway",
"scope": "lte",
"trust": 1.0,
"vendor": "mcafee",
"version": "7.7.2.2"
},
{
"model": "enterprise linux server eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.6"
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "c library",
"scope": "lte",
"trust": 0.8,
"vendor": "gnu",
"version": "2.25"
},
{
"model": "cloud magnum orchestration",
"scope": null,
"trust": 0.8,
"vendor": "openstack",
"version": null
},
{
"model": "leap",
"scope": null,
"trust": 0.8,
"vendor": "opensuse",
"version": null
},
{
"model": "linux enterprise desktop",
"scope": null,
"trust": 0.8,
"vendor": "suse",
"version": null
},
{
"model": "linux enterprise for sap",
"scope": null,
"trust": 0.8,
"vendor": "suse",
"version": null
},
{
"model": "linux enterprise point of sale",
"scope": null,
"trust": 0.8,
"vendor": "suse",
"version": null
},
{
"model": "linux enterprise server",
"scope": null,
"trust": 0.8,
"vendor": "suse",
"version": null
},
{
"model": "linux enterprise server for raspberry pi",
"scope": null,
"trust": 0.8,
"vendor": "suse",
"version": null
},
{
"model": "linux enterprise software development kit",
"scope": null,
"trust": 0.8,
"vendor": "suse",
"version": null
},
{
"model": "openstack cloud",
"scope": null,
"trust": 0.8,
"vendor": "suse",
"version": null
},
{
"model": "enterprise linux",
"scope": null,
"trust": 0.8,
"vendor": "red hat",
"version": null
},
{
"model": "enterprise linux aus",
"scope": null,
"trust": 0.8,
"vendor": "red hat",
"version": null
},
{
"model": "enterprise linux eus",
"scope": null,
"trust": 0.8,
"vendor": "red hat",
"version": null
},
{
"model": "enterprise linux long life",
"scope": null,
"trust": 0.8,
"vendor": "red hat",
"version": null
},
{
"model": "enterprise linux server",
"scope": null,
"trust": 0.8,
"vendor": "red hat",
"version": null
},
{
"model": "enterprise linux server eus",
"scope": null,
"trust": 0.8,
"vendor": "red hat",
"version": null
},
{
"model": "enterprise linux server tus",
"scope": null,
"trust": 0.8,
"vendor": "red hat",
"version": null
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "7"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "6"
},
{
"model": "vm server for",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "x863.4"
},
{
"model": "vm server for",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "x863.3"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "7"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "6"
},
{
"model": "web gateway",
"scope": "eq",
"trust": 0.3,
"vendor": "mcafee",
"version": "7.7"
},
{
"model": "web gateway",
"scope": "eq",
"trust": 0.3,
"vendor": "mcafee",
"version": "7.7.2.2"
},
{
"model": "web gateway",
"scope": "eq",
"trust": 0.3,
"vendor": "mcafee",
"version": "7.6.2.4"
},
{
"model": "web gateway",
"scope": "eq",
"trust": 0.3,
"vendor": "mcafee",
"version": "7.6.2.3"
},
{
"model": "web gateway",
"scope": "eq",
"trust": 0.3,
"vendor": "mcafee",
"version": "7.6.2.2"
},
{
"model": "web gateway",
"scope": "eq",
"trust": 0.3,
"vendor": "mcafee",
"version": "7.6.2.14"
},
{
"model": "web gateway",
"scope": "eq",
"trust": 0.3,
"vendor": "mcafee",
"version": "7.6.2.1"
},
{
"model": "web gateway",
"scope": "eq",
"trust": 0.3,
"vendor": "mcafee",
"version": "7.6.2.0"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.22.90"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.12.2"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.12.1"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.11.2"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.11.1"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.10.1"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.2.5"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.2.4"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.2.3"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.2.2"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.2.1"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.2"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.1.9"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.1.3-10"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.1.3"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.1.2"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.1.1"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.1"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.0.6"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.0.5"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.0.4"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.0.3"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.0.2"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.0.1"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.0"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.25"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.24"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.23"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.22"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.21"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.20"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.19"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.18"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.17"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.16"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.15"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.14.1"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.14"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.13"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.12"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.11.3"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.11"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.10"
},
{
"model": "glibc",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "2.1.3.10"
},
{
"model": "cfengine",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "1.2.3"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "linux s/390",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "linux mips",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "linux ia-64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "linux ia-32",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "linux ia-30",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "web gateway",
"scope": "ne",
"trust": 0.3,
"vendor": "mcafee",
"version": "7.7.2.3"
},
{
"model": "web gateway",
"scope": "ne",
"trust": 0.3,
"vendor": "mcafee",
"version": "7.6.2.15"
}
],
"sources": [
{
"db": "BID",
"id": "99127"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-808"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005209"
},
{
"db": "NVD",
"id": "CVE-2017-1000366"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:gnu:glibc",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:openstack:cloud_magnum_orchestration",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:opensuse_project:leap",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:suse:linux_enterprise_desktop",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:suse:linux_enterprise_for_sap",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:suse:suse_linux_enterprise_point_of_sale",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:suse:linux_enterprise_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:suse:linux_enterprise_server_for_raspberry_pi",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:suse:linux_enterprise_software_development_kit",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:suse:openstack_cloud",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux_aus",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux_eus",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux_long_life",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux_server_eus",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux_server_tus",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-005209"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "T. Weber",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201706-808"
}
],
"trust": 0.6
},
"cve": "CVE-2017-1000366",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CVE-2017-1000366",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "VHN-100094",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2017-1000366",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-1000366",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2017-1000366",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201706-808",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-100094",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2017-1000366",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-100094"
},
{
"db": "VULMON",
"id": "CVE-2017-1000366"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-808"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005209"
},
{
"db": "NVD",
"id": "CVE-2017-1000366"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier. glibc Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. GNU glibc is prone to local memory-corruption vulnerability. \nAn attacker could exploit this issue to execute arbitrary code in the context of the application. \nGNU glibc 2.25 and prior versions are vulnerable. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: glibc security update\nAdvisory ID: RHSA-2017:1479-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2017:1479\nIssue date: 2017-06-19\nCVE Names: CVE-2017-1000366 \n=====================================================================\n\n1. Summary:\n\nAn update for glibc is now available for Red Hat Enterprise Linux 5\nExtended Lifecycle Support, Red Hat Enterprise Linux 5.9 Long Life, Red Hat\nEnterprise Linux 6.2 Advanced Update Support, Red Hat Enterprise Linux 6.4\nAdvanced Update Support, Red Hat Enterprise Linux 6.5 Advanced Update\nSupport, Red Hat Enterprise Linux 6.5 Telco Extended Update Support, Red\nHat Enterprise Linux 6.6 Advanced Update Support, Red Hat Enterprise Linux\n6.6 Telco Extended Update Support, Red Hat Enterprise Linux 6.7 Extended\nUpdate Support, and Red Hat Enterprise Linux 7.2 Extended Update Support. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.2) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2) - x86_64\nRed Hat Enterprise Linux HPC Node EUS (v. 6.7) - x86_64\nRed Hat Enterprise Linux HPC Node Optional EUS (v. 6.7) - x86_64\nRed Hat Enterprise Linux Long Life (v. 5.9 server) - i386, ia64, x86_64\nRed Hat Enterprise Linux Server (v. 5 ELS) - i386, s390x, x86_64\nRed Hat Enterprise Linux Server AUS (v. 6.2) - x86_64\nRed Hat Enterprise Linux Server AUS (v. 6.4) - x86_64\nRed Hat Enterprise Linux Server AUS (v. 6.5) - x86_64\nRed Hat Enterprise Linux Server AUS (v. 6.6) - x86_64\nRed Hat Enterprise Linux Server EUS (v. 6.7) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server EUS (v. 7.2) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional AUS (v. 6.2) - x86_64\nRed Hat Enterprise Linux Server Optional AUS (v. 6.4) - x86_64\nRed Hat Enterprise Linux Server Optional AUS (v. 6.5) - x86_64\nRed Hat Enterprise Linux Server Optional AUS (v. 6.6) - x86_64\nRed Hat Enterprise Linux Server Optional EUS (v. 6.7) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional EUS (v. 7.2) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional TUS (v. 6.5) - x86_64\nRed Hat Enterprise Linux Server Optional TUS (v. 6.6) - x86_64\nRed Hat Enterprise Linux Server TUS (v. 6.5) - x86_64\nRed Hat Enterprise Linux Server TUS (v. 6.6) - x86_64\n\n3. Description:\n\nThe glibc packages provide the standard C libraries (libc), POSIX thread\nlibraries (libpthread), standard math libraries (libm), and the name\nservice cache daemon (nscd) used by multiple programs on the system. \nWithout these libraries, the Linux system cannot function correctly. This is glibc-side mitigation which blocks\nprocessing of LD_LIBRARY_PATH for programs running in secure-execution mode\nand reduces the number of allocations performed by the processing of\nLD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of\nthis issue more difficult. (CVE-2017-1000366)\n\nRed Hat would like to thank Qualys Research Labs for reporting this issue. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor the update to take effect, all services linked to the glibc library\nmust be restarted, or the system rebooted. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1452543 - CVE-2017-1000366 glibc: heap/stack gap jumping via unbounded stack allocations\n\n6. Package List:\n\nRed Hat Enterprise Linux Long Life (v. 5.9 server):\n\nSource:\nglibc-2.5-107.el5_9.9.src.rpm\n\ni386:\nglibc-2.5-107.el5_9.9.i386.rpm\nglibc-2.5-107.el5_9.9.i686.rpm\nglibc-common-2.5-107.el5_9.9.i386.rpm\nglibc-debuginfo-2.5-107.el5_9.9.i386.rpm\nglibc-debuginfo-2.5-107.el5_9.9.i686.rpm\nglibc-debuginfo-common-2.5-107.el5_9.9.i386.rpm\nglibc-devel-2.5-107.el5_9.9.i386.rpm\nglibc-headers-2.5-107.el5_9.9.i386.rpm\nglibc-utils-2.5-107.el5_9.9.i386.rpm\nnscd-2.5-107.el5_9.9.i386.rpm\n\nia64:\nglibc-2.5-107.el5_9.9.i686.rpm\nglibc-2.5-107.el5_9.9.ia64.rpm\nglibc-common-2.5-107.el5_9.9.ia64.rpm\nglibc-debuginfo-2.5-107.el5_9.9.i686.rpm\nglibc-debuginfo-2.5-107.el5_9.9.ia64.rpm\nglibc-debuginfo-common-2.5-107.el5_9.9.i386.rpm\nglibc-devel-2.5-107.el5_9.9.ia64.rpm\nglibc-headers-2.5-107.el5_9.9.ia64.rpm\nglibc-utils-2.5-107.el5_9.9.ia64.rpm\nnscd-2.5-107.el5_9.9.ia64.rpm\n\nx86_64:\nglibc-2.5-107.el5_9.9.i686.rpm\nglibc-2.5-107.el5_9.9.x86_64.rpm\nglibc-common-2.5-107.el5_9.9.x86_64.rpm\nglibc-debuginfo-2.5-107.el5_9.9.i386.rpm\nglibc-debuginfo-2.5-107.el5_9.9.i686.rpm\nglibc-debuginfo-2.5-107.el5_9.9.x86_64.rpm\nglibc-debuginfo-common-2.5-107.el5_9.9.i386.rpm\nglibc-devel-2.5-107.el5_9.9.i386.rpm\nglibc-devel-2.5-107.el5_9.9.x86_64.rpm\nglibc-headers-2.5-107.el5_9.9.x86_64.rpm\nglibc-utils-2.5-107.el5_9.9.x86_64.rpm\nnscd-2.5-107.el5_9.9.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 5 ELS):\n\nSource:\nglibc-2.5-123.el5_11.4.src.rpm\n\ni386:\nglibc-2.5-123.el5_11.4.i386.rpm\nglibc-2.5-123.el5_11.4.i686.rpm\nglibc-common-2.5-123.el5_11.4.i386.rpm\nglibc-debuginfo-2.5-123.el5_11.4.i386.rpm\nglibc-debuginfo-2.5-123.el5_11.4.i686.rpm\nglibc-debuginfo-common-2.5-123.el5_11.4.i386.rpm\nglibc-devel-2.5-123.el5_11.4.i386.rpm\nglibc-headers-2.5-123.el5_11.4.i386.rpm\nglibc-utils-2.5-123.el5_11.4.i386.rpm\nnscd-2.5-123.el5_11.4.i386.rpm\n\ns390x:\nglibc-2.5-123.el5_11.4.s390.rpm\nglibc-2.5-123.el5_11.4.s390x.rpm\nglibc-common-2.5-123.el5_11.4.s390x.rpm\nglibc-debuginfo-2.5-123.el5_11.4.s390.rpm\nglibc-debuginfo-2.5-123.el5_11.4.s390x.rpm\nglibc-devel-2.5-123.el5_11.4.s390.rpm\nglibc-devel-2.5-123.el5_11.4.s390x.rpm\nglibc-headers-2.5-123.el5_11.4.s390x.rpm\nglibc-utils-2.5-123.el5_11.4.s390x.rpm\nnscd-2.5-123.el5_11.4.s390x.rpm\n\nx86_64:\nglibc-2.5-123.el5_11.4.i686.rpm\nglibc-2.5-123.el5_11.4.x86_64.rpm\nglibc-common-2.5-123.el5_11.4.x86_64.rpm\nglibc-debuginfo-2.5-123.el5_11.4.i386.rpm\nglibc-debuginfo-2.5-123.el5_11.4.i686.rpm\nglibc-debuginfo-2.5-123.el5_11.4.x86_64.rpm\nglibc-debuginfo-common-2.5-123.el5_11.4.i386.rpm\nglibc-devel-2.5-123.el5_11.4.i386.rpm\nglibc-devel-2.5-123.el5_11.4.x86_64.rpm\nglibc-headers-2.5-123.el5_11.4.x86_64.rpm\nglibc-utils-2.5-123.el5_11.4.x86_64.rpm\nnscd-2.5-123.el5_11.4.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node EUS (v. 6.7):\n\nSource:\nglibc-2.12-1.166.el6_7.8.src.rpm\n\nx86_64:\nglibc-2.12-1.166.el6_7.8.i686.rpm\nglibc-2.12-1.166.el6_7.8.x86_64.rpm\nglibc-common-2.12-1.166.el6_7.8.x86_64.rpm\nglibc-debuginfo-2.12-1.166.el6_7.8.i686.rpm\nglibc-debuginfo-2.12-1.166.el6_7.8.x86_64.rpm\nglibc-debuginfo-common-2.12-1.166.el6_7.8.i686.rpm\nglibc-debuginfo-common-2.12-1.166.el6_7.8.x86_64.rpm\nglibc-devel-2.12-1.166.el6_7.8.i686.rpm\nglibc-devel-2.12-1.166.el6_7.8.x86_64.rpm\nglibc-headers-2.12-1.166.el6_7.8.x86_64.rpm\nglibc-utils-2.12-1.166.el6_7.8.x86_64.rpm\nnscd-2.12-1.166.el6_7.8.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional EUS (v. 6.7):\n\nx86_64:\nglibc-debuginfo-2.12-1.166.el6_7.8.i686.rpm\nglibc-debuginfo-2.12-1.166.el6_7.8.x86_64.rpm\nglibc-debuginfo-common-2.12-1.166.el6_7.8.i686.rpm\nglibc-debuginfo-common-2.12-1.166.el6_7.8.x86_64.rpm\nglibc-static-2.12-1.166.el6_7.8.i686.rpm\nglibc-static-2.12-1.166.el6_7.8.x86_64.rpm\n\nRed Hat Enterprise Linux Server AUS (v. 6.2):\n\nSource:\nglibc-2.12-1.47.el6_2.18.src.rpm\n\nx86_64:\nglibc-2.12-1.47.el6_2.18.i686.rpm\nglibc-2.12-1.47.el6_2.18.x86_64.rpm\nglibc-common-2.12-1.47.el6_2.18.x86_64.rpm\nglibc-debuginfo-2.12-1.47.el6_2.18.i686.rpm\nglibc-debuginfo-2.12-1.47.el6_2.18.x86_64.rpm\nglibc-debuginfo-common-2.12-1.47.el6_2.18.i686.rpm\nglibc-debuginfo-common-2.12-1.47.el6_2.18.x86_64.rpm\nglibc-devel-2.12-1.47.el6_2.18.i686.rpm\nglibc-devel-2.12-1.47.el6_2.18.x86_64.rpm\nglibc-headers-2.12-1.47.el6_2.18.x86_64.rpm\nglibc-utils-2.12-1.47.el6_2.18.x86_64.rpm\nnscd-2.12-1.47.el6_2.18.x86_64.rpm\n\nRed Hat Enterprise Linux Server AUS (v. 6.4):\n\nSource:\nglibc-2.12-1.107.el6_4.10.src.rpm\n\nx86_64:\nglibc-2.12-1.107.el6_4.10.i686.rpm\nglibc-2.12-1.107.el6_4.10.x86_64.rpm\nglibc-common-2.12-1.107.el6_4.10.x86_64.rpm\nglibc-debuginfo-2.12-1.107.el6_4.10.i686.rpm\nglibc-debuginfo-2.12-1.107.el6_4.10.x86_64.rpm\nglibc-debuginfo-common-2.12-1.107.el6_4.10.i686.rpm\nglibc-debuginfo-common-2.12-1.107.el6_4.10.x86_64.rpm\nglibc-devel-2.12-1.107.el6_4.10.i686.rpm\nglibc-devel-2.12-1.107.el6_4.10.x86_64.rpm\nglibc-headers-2.12-1.107.el6_4.10.x86_64.rpm\nglibc-utils-2.12-1.107.el6_4.10.x86_64.rpm\nnscd-2.12-1.107.el6_4.10.x86_64.rpm\n\nRed Hat Enterprise Linux Server AUS (v. 6.5):\n\nSource:\nglibc-2.12-1.132.el6_5.9.src.rpm\n\nx86_64:\nglibc-2.12-1.132.el6_5.9.i686.rpm\nglibc-2.12-1.132.el6_5.9.x86_64.rpm\nglibc-common-2.12-1.132.el6_5.9.x86_64.rpm\nglibc-debuginfo-2.12-1.132.el6_5.9.i686.rpm\nglibc-debuginfo-2.12-1.132.el6_5.9.x86_64.rpm\nglibc-debuginfo-common-2.12-1.132.el6_5.9.i686.rpm\nglibc-debuginfo-common-2.12-1.132.el6_5.9.x86_64.rpm\nglibc-devel-2.12-1.132.el6_5.9.i686.rpm\nglibc-devel-2.12-1.132.el6_5.9.x86_64.rpm\nglibc-headers-2.12-1.132.el6_5.9.x86_64.rpm\nglibc-utils-2.12-1.132.el6_5.9.x86_64.rpm\nnscd-2.12-1.132.el6_5.9.x86_64.rpm\n\nRed Hat Enterprise Linux Server TUS (v. 6.5):\n\nSource:\nglibc-2.12-1.132.el6_5.9.src.rpm\n\nx86_64:\nglibc-2.12-1.132.el6_5.9.i686.rpm\nglibc-2.12-1.132.el6_5.9.x86_64.rpm\nglibc-common-2.12-1.132.el6_5.9.x86_64.rpm\nglibc-debuginfo-2.12-1.132.el6_5.9.i686.rpm\nglibc-debuginfo-2.12-1.132.el6_5.9.x86_64.rpm\nglibc-debuginfo-common-2.12-1.132.el6_5.9.i686.rpm\nglibc-debuginfo-common-2.12-1.132.el6_5.9.x86_64.rpm\nglibc-devel-2.12-1.132.el6_5.9.i686.rpm\nglibc-devel-2.12-1.132.el6_5.9.x86_64.rpm\nglibc-headers-2.12-1.132.el6_5.9.x86_64.rpm\nglibc-utils-2.12-1.132.el6_5.9.x86_64.rpm\nnscd-2.12-1.132.el6_5.9.x86_64.rpm\n\nRed Hat Enterprise Linux Server AUS (v. 6.6):\n\nSource:\nglibc-2.12-1.149.el6_6.12.src.rpm\n\nx86_64:\nglibc-2.12-1.149.el6_6.12.i686.rpm\nglibc-2.12-1.149.el6_6.12.x86_64.rpm\nglibc-common-2.12-1.149.el6_6.12.x86_64.rpm\nglibc-debuginfo-2.12-1.149.el6_6.12.i686.rpm\nglibc-debuginfo-2.12-1.149.el6_6.12.x86_64.rpm\nglibc-debuginfo-common-2.12-1.149.el6_6.12.i686.rpm\nglibc-debuginfo-common-2.12-1.149.el6_6.12.x86_64.rpm\nglibc-devel-2.12-1.149.el6_6.12.i686.rpm\nglibc-devel-2.12-1.149.el6_6.12.x86_64.rpm\nglibc-headers-2.12-1.149.el6_6.12.x86_64.rpm\nglibc-utils-2.12-1.149.el6_6.12.x86_64.rpm\nnscd-2.12-1.149.el6_6.12.x86_64.rpm\n\nRed Hat Enterprise Linux Server TUS (v. 6.6):\n\nSource:\nglibc-2.12-1.149.el6_6.12.src.rpm\n\nx86_64:\nglibc-2.12-1.149.el6_6.12.i686.rpm\nglibc-2.12-1.149.el6_6.12.x86_64.rpm\nglibc-common-2.12-1.149.el6_6.12.x86_64.rpm\nglibc-debuginfo-2.12-1.149.el6_6.12.i686.rpm\nglibc-debuginfo-2.12-1.149.el6_6.12.x86_64.rpm\nglibc-debuginfo-common-2.12-1.149.el6_6.12.i686.rpm\nglibc-debuginfo-common-2.12-1.149.el6_6.12.x86_64.rpm\nglibc-devel-2.12-1.149.el6_6.12.i686.rpm\nglibc-devel-2.12-1.149.el6_6.12.x86_64.rpm\nglibc-headers-2.12-1.149.el6_6.12.x86_64.rpm\nglibc-utils-2.12-1.149.el6_6.12.x86_64.rpm\nnscd-2.12-1.149.el6_6.12.x86_64.rpm\n\nRed Hat Enterprise Linux Server EUS (v. 6.7):\n\nSource:\nglibc-2.12-1.166.el6_7.8.src.rpm\n\ni386:\nglibc-2.12-1.166.el6_7.8.i686.rpm\nglibc-common-2.12-1.166.el6_7.8.i686.rpm\nglibc-debuginfo-2.12-1.166.el6_7.8.i686.rpm\nglibc-debuginfo-common-2.12-1.166.el6_7.8.i686.rpm\nglibc-devel-2.12-1.166.el6_7.8.i686.rpm\nglibc-headers-2.12-1.166.el6_7.8.i686.rpm\nglibc-utils-2.12-1.166.el6_7.8.i686.rpm\nnscd-2.12-1.166.el6_7.8.i686.rpm\n\nppc64:\nglibc-2.12-1.166.el6_7.8.ppc.rpm\nglibc-2.12-1.166.el6_7.8.ppc64.rpm\nglibc-common-2.12-1.166.el6_7.8.ppc64.rpm\nglibc-debuginfo-2.12-1.166.el6_7.8.ppc.rpm\nglibc-debuginfo-2.12-1.166.el6_7.8.ppc64.rpm\nglibc-debuginfo-common-2.12-1.166.el6_7.8.ppc.rpm\nglibc-debuginfo-common-2.12-1.166.el6_7.8.ppc64.rpm\nglibc-devel-2.12-1.166.el6_7.8.ppc.rpm\nglibc-devel-2.12-1.166.el6_7.8.ppc64.rpm\nglibc-headers-2.12-1.166.el6_7.8.ppc64.rpm\nglibc-utils-2.12-1.166.el6_7.8.ppc64.rpm\nnscd-2.12-1.166.el6_7.8.ppc64.rpm\n\ns390x:\nglibc-2.12-1.166.el6_7.8.s390.rpm\nglibc-2.12-1.166.el6_7.8.s390x.rpm\nglibc-common-2.12-1.166.el6_7.8.s390x.rpm\nglibc-debuginfo-2.12-1.166.el6_7.8.s390.rpm\nglibc-debuginfo-2.12-1.166.el6_7.8.s390x.rpm\nglibc-debuginfo-common-2.12-1.166.el6_7.8.s390.rpm\nglibc-debuginfo-common-2.12-1.166.el6_7.8.s390x.rpm\nglibc-devel-2.12-1.166.el6_7.8.s390.rpm\nglibc-devel-2.12-1.166.el6_7.8.s390x.rpm\nglibc-headers-2.12-1.166.el6_7.8.s390x.rpm\nglibc-utils-2.12-1.166.el6_7.8.s390x.rpm\nnscd-2.12-1.166.el6_7.8.s390x.rpm\n\nx86_64:\nglibc-2.12-1.166.el6_7.8.i686.rpm\nglibc-2.12-1.166.el6_7.8.x86_64.rpm\nglibc-common-2.12-1.166.el6_7.8.x86_64.rpm\nglibc-debuginfo-2.12-1.166.el6_7.8.i686.rpm\nglibc-debuginfo-2.12-1.166.el6_7.8.x86_64.rpm\nglibc-debuginfo-common-2.12-1.166.el6_7.8.i686.rpm\nglibc-debuginfo-common-2.12-1.166.el6_7.8.x86_64.rpm\nglibc-devel-2.12-1.166.el6_7.8.i686.rpm\nglibc-devel-2.12-1.166.el6_7.8.x86_64.rpm\nglibc-headers-2.12-1.166.el6_7.8.x86_64.rpm\nglibc-utils-2.12-1.166.el6_7.8.x86_64.rpm\nnscd-2.12-1.166.el6_7.8.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional AUS (v. 6.2):\n\nSource:\nglibc-2.12-1.47.el6_2.18.src.rpm\n\nx86_64:\nglibc-debuginfo-2.12-1.47.el6_2.18.i686.rpm\nglibc-debuginfo-2.12-1.47.el6_2.18.x86_64.rpm\nglibc-debuginfo-common-2.12-1.47.el6_2.18.i686.rpm\nglibc-debuginfo-common-2.12-1.47.el6_2.18.x86_64.rpm\nglibc-static-2.12-1.47.el6_2.18.i686.rpm\nglibc-static-2.12-1.47.el6_2.18.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional AUS (v. 6.4):\n\nSource:\nglibc-2.12-1.107.el6_4.10.src.rpm\n\nx86_64:\nglibc-debuginfo-2.12-1.107.el6_4.10.i686.rpm\nglibc-debuginfo-2.12-1.107.el6_4.10.x86_64.rpm\nglibc-debuginfo-common-2.12-1.107.el6_4.10.i686.rpm\nglibc-debuginfo-common-2.12-1.107.el6_4.10.x86_64.rpm\nglibc-static-2.12-1.107.el6_4.10.i686.rpm\nglibc-static-2.12-1.107.el6_4.10.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional AUS (v. 6.5):\n\nSource:\nglibc-2.12-1.132.el6_5.9.src.rpm\n\nx86_64:\nglibc-debuginfo-2.12-1.132.el6_5.9.i686.rpm\nglibc-debuginfo-2.12-1.132.el6_5.9.x86_64.rpm\nglibc-debuginfo-common-2.12-1.132.el6_5.9.i686.rpm\nglibc-debuginfo-common-2.12-1.132.el6_5.9.x86_64.rpm\nglibc-static-2.12-1.132.el6_5.9.i686.rpm\nglibc-static-2.12-1.132.el6_5.9.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional TUS (v. 6.5):\n\nSource:\nglibc-2.12-1.132.el6_5.9.src.rpm\n\nx86_64:\nglibc-debuginfo-2.12-1.132.el6_5.9.i686.rpm\nglibc-debuginfo-2.12-1.132.el6_5.9.x86_64.rpm\nglibc-debuginfo-common-2.12-1.132.el6_5.9.i686.rpm\nglibc-debuginfo-common-2.12-1.132.el6_5.9.x86_64.rpm\nglibc-static-2.12-1.132.el6_5.9.i686.rpm\nglibc-static-2.12-1.132.el6_5.9.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional AUS (v. 6.6):\n\nx86_64:\nglibc-debuginfo-2.12-1.149.el6_6.12.i686.rpm\nglibc-debuginfo-2.12-1.149.el6_6.12.x86_64.rpm\nglibc-debuginfo-common-2.12-1.149.el6_6.12.i686.rpm\nglibc-debuginfo-common-2.12-1.149.el6_6.12.x86_64.rpm\nglibc-static-2.12-1.149.el6_6.12.i686.rpm\nglibc-static-2.12-1.149.el6_6.12.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional TUS (v. 6.6):\n\nx86_64:\nglibc-debuginfo-2.12-1.149.el6_6.12.i686.rpm\nglibc-debuginfo-2.12-1.149.el6_6.12.x86_64.rpm\nglibc-debuginfo-common-2.12-1.149.el6_6.12.i686.rpm\nglibc-debuginfo-common-2.12-1.149.el6_6.12.x86_64.rpm\nglibc-static-2.12-1.149.el6_6.12.i686.rpm\nglibc-static-2.12-1.149.el6_6.12.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional EUS (v. 6.7):\n\ni386:\nglibc-debuginfo-2.12-1.166.el6_7.8.i686.rpm\nglibc-debuginfo-common-2.12-1.166.el6_7.8.i686.rpm\nglibc-static-2.12-1.166.el6_7.8.i686.rpm\n\nppc64:\nglibc-debuginfo-2.12-1.166.el6_7.8.ppc.rpm\nglibc-debuginfo-2.12-1.166.el6_7.8.ppc64.rpm\nglibc-debuginfo-common-2.12-1.166.el6_7.8.ppc.rpm\nglibc-debuginfo-common-2.12-1.166.el6_7.8.ppc64.rpm\nglibc-static-2.12-1.166.el6_7.8.ppc.rpm\nglibc-static-2.12-1.166.el6_7.8.ppc64.rpm\n\ns390x:\nglibc-debuginfo-2.12-1.166.el6_7.8.s390.rpm\nglibc-debuginfo-2.12-1.166.el6_7.8.s390x.rpm\nglibc-debuginfo-common-2.12-1.166.el6_7.8.s390.rpm\nglibc-debuginfo-common-2.12-1.166.el6_7.8.s390x.rpm\nglibc-static-2.12-1.166.el6_7.8.s390.rpm\nglibc-static-2.12-1.166.el6_7.8.s390x.rpm\n\nx86_64:\nglibc-debuginfo-2.12-1.166.el6_7.8.i686.rpm\nglibc-debuginfo-2.12-1.166.el6_7.8.x86_64.rpm\nglibc-debuginfo-common-2.12-1.166.el6_7.8.i686.rpm\nglibc-debuginfo-common-2.12-1.166.el6_7.8.x86_64.rpm\nglibc-static-2.12-1.166.el6_7.8.i686.rpm\nglibc-static-2.12-1.166.el6_7.8.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.2):\n\nSource:\nglibc-2.17-106.el7_2.9.src.rpm\n\nx86_64:\nglibc-2.17-106.el7_2.9.i686.rpm\nglibc-2.17-106.el7_2.9.x86_64.rpm\nglibc-common-2.17-106.el7_2.9.x86_64.rpm\nglibc-debuginfo-2.17-106.el7_2.9.i686.rpm\nglibc-debuginfo-2.17-106.el7_2.9.x86_64.rpm\nglibc-debuginfo-common-2.17-106.el7_2.9.i686.rpm\nglibc-debuginfo-common-2.17-106.el7_2.9.x86_64.rpm\nglibc-devel-2.17-106.el7_2.9.i686.rpm\nglibc-devel-2.17-106.el7_2.9.x86_64.rpm\nglibc-headers-2.17-106.el7_2.9.x86_64.rpm\nglibc-utils-2.17-106.el7_2.9.x86_64.rpm\nnscd-2.17-106.el7_2.9.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.2):\n\nx86_64:\nglibc-debuginfo-2.17-106.el7_2.9.i686.rpm\nglibc-debuginfo-2.17-106.el7_2.9.x86_64.rpm\nglibc-debuginfo-common-2.17-106.el7_2.9.i686.rpm\nglibc-debuginfo-common-2.17-106.el7_2.9.x86_64.rpm\nglibc-static-2.17-106.el7_2.9.i686.rpm\nglibc-static-2.17-106.el7_2.9.x86_64.rpm\n\nRed Hat Enterprise Linux Server EUS (v. 7.2):\n\nSource:\nglibc-2.17-106.el7_2.9.src.rpm\n\nppc64:\nglibc-2.17-106.el7_2.9.ppc.rpm\nglibc-2.17-106.el7_2.9.ppc64.rpm\nglibc-common-2.17-106.el7_2.9.ppc64.rpm\nglibc-debuginfo-2.17-106.el7_2.9.ppc.rpm\nglibc-debuginfo-2.17-106.el7_2.9.ppc64.rpm\nglibc-debuginfo-common-2.17-106.el7_2.9.ppc.rpm\nglibc-debuginfo-common-2.17-106.el7_2.9.ppc64.rpm\nglibc-devel-2.17-106.el7_2.9.ppc.rpm\nglibc-devel-2.17-106.el7_2.9.ppc64.rpm\nglibc-headers-2.17-106.el7_2.9.ppc64.rpm\nglibc-utils-2.17-106.el7_2.9.ppc64.rpm\nnscd-2.17-106.el7_2.9.ppc64.rpm\n\nppc64le:\nglibc-2.17-106.el7_2.9.ppc64le.rpm\nglibc-common-2.17-106.el7_2.9.ppc64le.rpm\nglibc-debuginfo-2.17-106.el7_2.9.ppc64le.rpm\nglibc-debuginfo-common-2.17-106.el7_2.9.ppc64le.rpm\nglibc-devel-2.17-106.el7_2.9.ppc64le.rpm\nglibc-headers-2.17-106.el7_2.9.ppc64le.rpm\nglibc-utils-2.17-106.el7_2.9.ppc64le.rpm\nnscd-2.17-106.el7_2.9.ppc64le.rpm\n\ns390x:\nglibc-2.17-106.el7_2.9.s390.rpm\nglibc-2.17-106.el7_2.9.s390x.rpm\nglibc-common-2.17-106.el7_2.9.s390x.rpm\nglibc-debuginfo-2.17-106.el7_2.9.s390.rpm\nglibc-debuginfo-2.17-106.el7_2.9.s390x.rpm\nglibc-debuginfo-common-2.17-106.el7_2.9.s390.rpm\nglibc-debuginfo-common-2.17-106.el7_2.9.s390x.rpm\nglibc-devel-2.17-106.el7_2.9.s390.rpm\nglibc-devel-2.17-106.el7_2.9.s390x.rpm\nglibc-headers-2.17-106.el7_2.9.s390x.rpm\nglibc-utils-2.17-106.el7_2.9.s390x.rpm\nnscd-2.17-106.el7_2.9.s390x.rpm\n\nx86_64:\nglibc-2.17-106.el7_2.9.i686.rpm\nglibc-2.17-106.el7_2.9.x86_64.rpm\nglibc-common-2.17-106.el7_2.9.x86_64.rpm\nglibc-debuginfo-2.17-106.el7_2.9.i686.rpm\nglibc-debuginfo-2.17-106.el7_2.9.x86_64.rpm\nglibc-debuginfo-common-2.17-106.el7_2.9.i686.rpm\nglibc-debuginfo-common-2.17-106.el7_2.9.x86_64.rpm\nglibc-devel-2.17-106.el7_2.9.i686.rpm\nglibc-devel-2.17-106.el7_2.9.x86_64.rpm\nglibc-headers-2.17-106.el7_2.9.x86_64.rpm\nglibc-utils-2.17-106.el7_2.9.x86_64.rpm\nnscd-2.17-106.el7_2.9.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional EUS (v. 7.2):\n\nppc64:\nglibc-debuginfo-2.17-106.el7_2.9.ppc.rpm\nglibc-debuginfo-2.17-106.el7_2.9.ppc64.rpm\nglibc-debuginfo-common-2.17-106.el7_2.9.ppc.rpm\nglibc-debuginfo-common-2.17-106.el7_2.9.ppc64.rpm\nglibc-static-2.17-106.el7_2.9.ppc.rpm\nglibc-static-2.17-106.el7_2.9.ppc64.rpm\n\nppc64le:\nglibc-debuginfo-2.17-106.el7_2.9.ppc64le.rpm\nglibc-debuginfo-common-2.17-106.el7_2.9.ppc64le.rpm\nglibc-static-2.17-106.el7_2.9.ppc64le.rpm\n\ns390x:\nglibc-debuginfo-2.17-106.el7_2.9.s390.rpm\nglibc-debuginfo-2.17-106.el7_2.9.s390x.rpm\nglibc-debuginfo-common-2.17-106.el7_2.9.s390.rpm\nglibc-debuginfo-common-2.17-106.el7_2.9.s390x.rpm\nglibc-static-2.17-106.el7_2.9.s390.rpm\nglibc-static-2.17-106.el7_2.9.s390x.rpm\n\nx86_64:\nglibc-debuginfo-2.17-106.el7_2.9.i686.rpm\nglibc-debuginfo-2.17-106.el7_2.9.x86_64.rpm\nglibc-debuginfo-common-2.17-106.el7_2.9.i686.rpm\nglibc-debuginfo-common-2.17-106.el7_2.9.x86_64.rpm\nglibc-static-2.17-106.el7_2.9.i686.rpm\nglibc-static-2.17-106.el7_2.9.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2017-1000366\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/stackguard\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2017 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFZSDV3XlSAg2UNWIIRAibeAKC2QtxViqngTTBVM9fvG1XjRCkgwACgrHP1\nPVr1sUH9RUhxrQOKQqWtnKY=\n=ywUB\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. For the full details, please refer to their advisory\npublished at:\nhttps://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt\n\nFor the oldstable distribution (jessie), this problem has been fixed\nin version 2.19-18+deb8u10. \n\nFor the stable distribution (stretch), this problem has been fixed in\nversion 2.24-11+deb9u1. \n\nFor the unstable distribution (sid), this problem will be fixed soon. \n\nWe recommend that you upgrade your glibc packages. \nQualys Security Advisory\n\nThe Stack Clash\n\n\n========================================================================\nContents\n========================================================================\n\nI. Introduction\nII. Problem\n II.1. Automatic stack expansion\n II.2. Stack guard-page\n II.3. Stack-clash exploitation\nIII. Solutions\nIV. Results\n IV.1. Linux\n IV.2. OpenBSD\n IV.3. NetBSD\n IV.4. FreeBSD\n IV.5. Solaris\nV. Acknowledgments\n\n\n========================================================================\nI. Introduction\n========================================================================\n\nOur research started with a 96-megabyte surprise:\n\nb97bb000-b97dc000 rw-p 00000000 00:00 0 [heap]\nbf7c6000-bf806000 rw-p 00000000 00:00 0 [stack]\n\nand a 12-year-old question: \"If the heap grows up, and the stack grows\ndown, what happens when they clash? Is it exploitable? How?\"\n\n- In 2005, Gael Delalleau presented \"Large memory management\n vulnerabilities\" and the first stack-clash exploit in user-space\n (against mod_php 4.3.0 on Apache 2.0.53):\n\n http://cansecwest.com/core05/memory_vulns_delalleau.pdf\n\n- In 2010, Rafal Wojtczuk published \"Exploiting large memory management\n vulnerabilities in Xorg server running on Linux\", the second\n stack-clash exploit in user-space (CVE-2010-2240):\n\n http://www.invisiblethingslab.com/resources/misc-2010/xorg-large-memory-attacks.pdf\n\n- Since 2010, security researchers have exploited several stack-clashes\n in the kernel-space; for example:\n\n https://jon.oberheide.org/blog/2010/11/29/exploiting-stack-overflows-in-the-linux-kernel/\n https://jon.oberheide.org/files/infiltrate12-thestackisback.pdf\n https://googleprojectzero.blogspot.com/2016/06/exploiting-recursion-in-linux-kernel_20.html\n\nIn user-space, however, this problem has been greatly underestimated;\nthe only public exploits are Gael Delalleau\u0027s and Rafal Wojtczuk\u0027s, and\nthey were written before Linux introduced a protection against\nstack-clashes (a \"guard-page\" mapped below the stack):\n\nhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2240\n\nIn this advisory, we show that stack-clashes are widespread in\nuser-space, and exploitable despite the stack guard-page; we discovered\nmultiple vulnerabilities in guard-page implementations, and devised\ngeneral methods for:\n\n- \"Clashing\" the stack with another memory region: we allocate memory\n until the stack reaches another memory region, or until another memory\n region reaches the stack;\n\n- \"Jumping\" over the stack guard-page: we move the stack-pointer from\n the stack and into the other memory region, without accessing the\n stack guard-page;\n\n- \"Smashing\" the stack, or the other memory region: we overwrite the\n stack with the other memory region, or the other memory region with\n the stack. \n\nTo illustrate our findings, we developed the following exploits and\nproofs-of-concepts:\n\n- a local-root exploit against Exim (CVE-2017-1000369, CVE-2017-1000376)\n on i386 Debian;\n\n- a local-root exploit against Sudo (CVE-2017-1000367, CVE-2017-1000366)\n on i386 Debian, Ubuntu, CentOS;\n\n- an independent Sudoer-to-root exploit against CVE-2017-1000367 on any\n SELinux-enabled distribution;\n\n- a local-root exploit against ld.so and most SUID-root binaries\n (CVE-2017-1000366, CVE-2017-1000370) on i386 Debian, Fedora, CentOS;\n\n- a local-root exploit against ld.so and most SUID-root PIEs\n (CVE-2017-1000366, CVE-2017-1000371) on i386 Debian, Ubuntu, Fedora;\n\n- a local-root exploit against /bin/su (CVE-2017-1000366,\n CVE-2017-1000365) on i386 Debian;\n\n- a proof-of-concept that gains eip control against Sudo on i386\n grsecurity/PaX (CVE-2017-1000367, CVE-2017-1000366, CVE-2017-1000377);\n\n- a local proof-of-concept that gains rip control against Exim\n (CVE-2017-1000369) on amd64 Debian;\n\n- a local-root exploit against ld.so and most SUID-root binaries\n (CVE-2017-1000366, CVE-2017-1000379) on amd64 Debian, Ubuntu, Fedora,\n CentOS;\n\n- a proof-of-concept against /usr/bin/at on i386 OpenBSD, for\n CVE-2017-1000372 in OpenBSD\u0027s stack guard-page implementation and\n CVE-2017-1000373 in OpenBSD\u0027s qsort() function;\n\n- a proof-of-concept for CVE-2017-1000374 and CVE-2017-1000375 in\n NetBSD\u0027s stack guard-page implementation;\n\n- a proof-of-concept for CVE-2017-1085 in FreeBSD\u0027s setrlimit()\n RLIMIT_STACK implementation;\n\n- two proofs-of-concept for CVE-2017-1083 and CVE-2017-1084 in FreeBSD\u0027s\n stack guard-page implementation;\n\n- a local-root exploit against /usr/bin/rsh (CVE-2017-3630,\n CVE-2017-3629, CVE-2017-3631) on Solaris 11. \n\n\n========================================================================\nII. Problem\n========================================================================\n\nNote: in this advisory, the \"start of the stack\" is the lowest address\nof its memory region, and the \"end of the stack\" is the highest address\nof its memory region; we do not use the ambiguous terms \"top of the\nstack\" and \"bottom of the stack\". \n\n========================================================================\nII.1. Automatic stack expansion\n========================================================================\n\nThe user-space stack of a process is automatically expanded by the\nkernel:\n\n- if the stack-pointer (the esp register, on i386) reaches the start of\n the stack and the unmapped memory pages below (the stack grows down,\n on i386),\n\n- then a \"page-fault\" exception is raised and caught by the kernel,\n\n- and the page-fault handler transparently expands the user-space stack\n of the process (it decreases the start address of the stack),\n\n- or it terminates the process with a SIGSEGV if the stack expansion\n fails (for example, if the RLIMIT_STACK is reached). \n\nUnfortunately, this stack expansion mechanism is implicit and fragile:\nit relies on page-fault exceptions, but if another memory region is\nmapped directly below the stack, then the stack-pointer can move from\nthe stack into the other memory region without raising a page-fault,\nand:\n\n- the kernel cannot tell that the process needed more stack memory;\n\n- the process cannot tell that its stack-pointer moved from the stack\n into another memory region. \n\nIn contrast, the heap expansion mechanism is explicit and robust: the\nprocess uses the brk() system-call to tell the kernel that it needs more\nheap memory, and the kernel expands the heap accordingly (it increases\nthe end address of the heap memory region -- the heap always grows up). \n\n========================================================================\nII.2. Stack guard-page\n========================================================================\n\nThe fragile stack expansion mechanism poses a security threat: if the\nstack-pointer of a process can move from the stack into another memory\nregion (which ends exactly where the stack starts) without raising a\npage-fault, then:\n\n- the process uses this other memory region as if it were an extension\n of the stack;\n\n- a write to this stack extension smashes the other memory region;\n\n- a write to the other memory region smashes the stack extension. \n\nTo protect against this security threat, the kernel maps a \"guard-page\"\nbelow the start of the stack: one or more PROT_NONE pages (or unmappable\npages) that:\n\n- raise a page-fault exception if accessed (before the stack-pointer can\n move from the stack into another memory region);\n\n- terminate the process with a SIGSEGV (because the page-fault handler\n cannot expand the stack if another memory region is mapped directly\n below). \n\nUnfortunately, a stack guard-page of a few kilobytes is insufficient\n(CVE-2017-1000364): if the stack-pointer \"jumps\" over the guard-page --\nif it moves from the stack into another memory region without accessing\nthe guard-page -- then no page-fault exception is raised and the stack\nextends into the other memory region. \n\nThis theoretical vulnerability was first described in Gael Delalleau\u0027s\n2005 presentation (slides 24-29). In the present advisory, we discuss\nits practicalities, and multiple vulnerabilities in stack guard-page\nimplementations (in OpenBSD, NetBSD, and FreeBSD), but we exclude\nrelated vulnerabilities such as unbounded alloca()s and VLAs\n(Variable-Length Arrays) that have been exploited in the past:\n\nhttp://phrack.org/issues/63/14.html\nhttp://blog.exodusintel.com/2013/01/07/who-was-phone/\n\n========================================================================\nII.3. Stack-clash exploitation\n========================================================================\n\n Must be a clash, there\u0027s no alternative. \n --The Clash, \"Kingston Advice\"\n\nOur exploits follow a series of four sequential steps -- each step\nallocates memory that must not be freed before all steps are complete:\n\nStep 1: Clash (the stack with another memory region)\nStep 2: Run (move the stack-pointer to the start of the stack)\nStep 3: Jump (over the stack guard-page, into the other memory region)\nStep 4: Smash (the stack, or the other memory region)\n\n========================================================================\nII.3.1. Step 1: Clash the stack with another memory region\n========================================================================\n\n Have the boys found the leak yet?\n --The Clash, \"The Leader\"\n\nAllocate memory until the start of the stack reaches the end of another\nmemory region, or until the end of another memory region reaches the\nstart of the stack. \n\n- The other memory region can be, for example:\n . the heap;\n . an anonymous mmap();\n . the read-write segment of ld.so;\n . the read-write segment of a PIE, a Position-Independent Executable. \n\n- The memory allocated in this Step 1 can be, for example:\n . stack and heap memory;\n . stack and anonymous mmap() memory;\n . stack memory only. \n\n- The heap and anonymous mmap() memory can be:\n\n . temporarily allocated, but not freed before the stack guard-page is\n jumped over in Step 3 and memory is smashed in Step 4;\n\n . permanently leaked. On Linux, a general method for allocating\n anonymous mmap()s is the LD_AUDIT memory leak that we discovered in\n the ld.so part of the glibc, the GNU C Library (CVE-2017-1000366). \n\n- The stack memory can be allocated, for example:\n\n . through megabytes of command-line arguments and environment\n variables. \n\n On Linux, this general method for allocating stack memory is limited\n by the kernel to 1/4 of the current RLIMIT_STACK (1GB on i386 if\n RLIMIT_STACK is RLIM_INFINITY -- man execve, \"Limits on size of\n arguments and environment\"). \n\n However, as we were drafting this advisory, we realized that the\n kernel imposes this limit on the argument and environment strings,\n but not on the argv[] and envp[] pointers to these strings, and we\n developed alternative versions of our Linux exploits that do not\n depend on application-specific memory leaks (CVE-2017-1000365). through recursive function calls. \n\n On BSD, we discovered a general method for allocating megabytes of\n stack memory: a vulnerability in qsort() that causes this function\n to recurse N/4 times, given a pathological input array of N elements\n (CVE-2017-1000373 in OpenBSD, CVE-2017-1000378 in NetBSD, and\n CVE-2017-1082 in FreeBSD). \n\n- In a few rare cases, Step 1 is not needed, because another memory\n region is naturally mapped directly below the stack (for example,\n ld.so in our Solaris exploit). \n\n========================================================================\nII.3.2. Step 2: Move the stack-pointer to the start of the stack\n========================================================================\n\n Run, run, run, run, run, don\u0027t you know?\n --The Clash, \"Three Card Trick\"\n\nConsume the unused stack memory that separates the stack-pointer from\nthe start of the stack. This Step 2 is similar to Step 3 (\"Jump over the\nstack guard-page\") but is needed because:\n\n- the stack-pointer is usually several kilobytes higher than the start\n of the stack (functions that allocate a large stack-frame decrease the\n start address of the stack, but this address is never increased\n again); moreover:\n\n . the FreeBSD kernel automatically expands the user-space stack of a\n process by multiples of 128KB (SGROWSIZ, in vm_map_growstack());\n\n . the Linux kernel initially expands the user-space stack of a process\n by 128KB (stack_expand, in setup_arg_pages()). \n\n- in Step 3, the stack-based buffer used to jump over the guard-page:\n\n . is usually not large enough to simultaneously move the stack-pointer\n to the start of the stack, and then into another memory region;\n\n . must not be fully written to (a full write would access the stack\n guard-page and terminate the process) but the stack memory consumed\n in this Step 2 can be fully written to (for example, strdupa() can\n be used in Step 2, but not in Step 3). \n\nThe stack memory consumed in this Step 2 can be, for example:\n\n- large stack-frames, alloca()s, or VLAs (which can be detected by\n grsecurity/PaX\u0027s STACKLEAK plugin for GCC,\n https://grsecurity.net/features.php);\n\n- recursive function calls (which can be detected by GNU cflow,\n http://www.gnu.org/software/cflow/);\n\n- on Linux, we discovered that the argv[] and envp[] arrays of pointers\n can be used to consume the 128KB of initial stack expansion, because\n the kernel allocates these arrays on the stack long after the call to\n setup_arg_pages(); this general method for completing Step 2 is\n exploitable locally, but the initial stack expansion poses a major\n obstacle to the remote exploitation of stack-clashes, as mentioned in\n IV.1.1. \n\nIn a few rare cases, Step 2 is not needed, because the stack-pointer is\nnaturally close to the start of the stack (for example, in Exim\u0027s main()\nfunction, the 256KB group_list[] moves the stack-pointer to the start of\nthe stack and beyond). \n\n========================================================================\nII.3.3. Step 3: Jump over the stack guard-page, into another memory\nregion\n========================================================================\n\n You need a little jump of electrical shockers. \n --The Clash, \"Clash City Rockers\"\n\nMove the stack-pointer from the stack and into the memory region that\nclashed with the stack in Step 1, but without accessing the guard-page. \nTo complete this Step 3, a large stack-based buffer, alloca(), or VLA is\nneeded, and:\n\n- it must be larger than the guard-page;\n\n- it must end in the stack, above the guard-page;\n\n- it must start in the memory region below the stack guard-page;\n\n- it must not be fully written to (a full write would access the\n guard-page, raise a page-fault exception, and terminate the process,\n because the memory region mapped directly below the stack prevents the\n page-fault handler from expanding the stack). \n\nIn a few cases, Step 3 is not needed:\n\n- on FreeBSD, a stack guard-page is implemented but disabled by default\n (CVE-2017-1083);\n\n- on OpenBSD, NetBSD, and FreeBSD, we discovered implementation\n vulnerabilities that eliminate the stack guard-page (CVE-2017-1000372,\n CVE-2017-1000374, CVE-2017-1084). \n\nOn Linux, we devised general methods for jumping over the stack\nguard-page (CVE-2017-1000366):\n\n- The glibc\u0027s __dcigettext() function alloca()tes single_locale, a\n stack-based buffer of up to 128KB (MAX_ARG_STRLEN, man execve), the\n length of the LANGUAGE environment variable (if the current locale is\n neither \"C\" nor \"POSIX\", but distributions install default locales\n such as \"C.UTF-8\" and \"en_US.utf8\"). \n\n If LANGUAGE is mostly composed of \u0027:\u0027 characters, then single_locale\n is barely written to, and can be used to jump over the stack\n guard-page. \n\n Moreover, if __dcigettext() finds the message to be translated, then\n _nl_find_msg() strdup()licates the OUTPUT_CHARSET environment variable\n and allows a local attacker to immediately smash the stack and gain\n control of the instruction pointer (the eip register, on i386), as\n detailed in Step 4a. \n\n We exploited this stack-clash against Sudo and su, but most of the\n SUID (set-user-ID) and SGID (set-group-ID) binaries that call\n setlocale(LC_ALL, \"\") and __dcigettext() or its derivatives (the\n *gettext() functions, the _() convenience macro, the strerror()\n function) are exploitable. \n\n- The glibc\u0027s vfprintf() function (called by the *printf() family of\n functions) alloca()tes a stack-based work buffer of up to 64KB\n (__MAX_ALLOCA_CUTOFF) if a width or precision is greater than 1KB\n (WORK_BUFFER_SIZE). \n\n If the corresponding format specifier is %s then this work buffer is\n never written to and can be used to jump over the stack guard-page. \n\n None of our exploits is based on this method, but it was one of our\n ideas to exploit Exim remotely, as mentioned in IV.1.1. \n\n- The glibc\u0027s getaddrinfo() function calls gaih_inet(), which\n alloca()tes tmpbuf, a stack-based buffer of up to 64KB\n (__MAX_ALLOCA_CUTOFF) that may be used to jump over the stack\n guard-page. \n\n Moreover, gaih_inet() calls the gethostbyname*() functions, which\n malloc()ate a heap-based DNS response of up to 64KB (MAXPACKET) that\n may allow a remote attacker to immediately smash the stack, as\n detailed in Step 4a. \n\n None of our exploits is based on this method, but it may be the key to\n the remote exploitation of stack-clashes. \n\n- The glibc\u0027s run-time dynamic linker ld.so alloca()tes llp_tmp, a\n stack-based copy of the LD_LIBRARY_PATH environment variable. If\n LD_LIBRARY_PATH contains Dynamic String Tokens (DSTs), they are first\n expanded: llp_tmp can be larger than 128KB (MAX_ARG_STRLEN) and not\n fully written to, and can therefore be used to jump over the stack\n guard-page and smash the memory region mapped directly below, as\n detailed in Step 4b. \n\n We exploited this ld.so stack-clash in two data-only attacks that\n bypass NX (No-eXecute) and ASLR (Address Space Layout Randomization)\n and obtain a privileged shell through most SUID and SGID binaries on\n most i386 Linux distributions. \n\n- Several local and remote applications allocate a 256KB stack-based\n \"gid_t buffer[NGROUPS_MAX];\" that is not fully written to and can be\n used to move the stack-pointer to the start of the stack (Step 2) and\n jump over the guard-page (Step 3). For example, Exim\u0027s main() function\n and older versions of util-linux\u0027s su. \n\n None of our exploits is based on this method, but an experimental\n version of our Exim exploit unexpectedly gained control of eip after\n the group_list[] buffer had jumped over the stack guard-page. \n\n========================================================================\nII.3.4. Step 4: Either smash the stack with another memory region (Step\n4a) or smash another memory region with the stack (Step 4b)\n========================================================================\n\n Smash and grab, it\u0027s that kind of world. \n --The Clash, \"One Emotion\"\n\nIn Step 3, a function allocates a large stack-based buffer and jumps\nover the stack guard-page into the memory region mapped directly below;\nin Step 4, before this function returns and jumps back into the stack:\n\n- Step 4a: a write to the memory region mapped below the stack (where\n esp still points to) effectively smashes the stack. We exploit this\n general method for completing Step 4 in Exim, Sudo, and su:\n\n . we overwrite a return-address on the stack and gain control of eip;\n\n . we return-into-libc (into system() or __libc_dlopen()) to defeat NX;\n\n . we brute-force ASLR (8 bits of entropy) if CVE-2016-3672 is patched;\n\n . we bypass SSP (Stack-Smashing Protector) because we overwrite the\n return-address of a function that is not protected by a stack canary\n (the memcpy() that smashes the stack usually overwrites its own\n stack-frame and return-address). \n\n- Step 4b: a write to the stack effectively smashes the memory region\n mapped below (where esp still points to). This second method for\n completing Step 4 is application-specific (it depends on the contents\n of the memory region that we smash) unless we exploit the run-time\n dynamic linker ld.so:\n\n . on Solaris, we devised a general method for smashing ld.so\u0027s\n read-write segment, overwriting one of its function pointers, and\n executing our own shell-code;\n\n . on Linux, we exploited most SUID and SGID binaries through ld.so:\n our \"hwcap\" exploit smashes an mmap()ed string, and our \".dynamic\"\n exploit smashes a PIE\u0027s read-write segment before it is mprotect()ed\n read-only by Full RELRO (Full RELocate Read-Only -- GNU_RELRO and\n BIND_NOW). \n\n\n========================================================================\nIII. Solutions\n========================================================================\n\nBased on our research, we recommend that the affected operating systems:\n\n- Increase the size of the stack guard-page to at least 1MB, and allow\n system administrators to easily modify this value (for example,\n grsecurity/PaX introduced /proc/sys/vm/heap_stack_gap in 2010). \n\n This first, short-term solution is cheap, but it can be defeated by a\n very large stack-based buffer. \n\n- Recompile all userland code (ld.so, libraries, binaries) with GCC\u0027s\n \"-fstack-check\" option, which prevents the stack-pointer from moving\n into another memory region without accessing the stack guard-page (it\n writes one word to every 4KB page allocated on the stack). \n\n This second, long-term solution is expensive, but it cannot be\n defeated (even if the stack guard-page is only 4KB, one page) --\n unless a vulnerability is discovered in the implementation of the\n stack guard-page or the \"-fstack-check\" option. \n\n\n========================================================================\nIV. Results\n========================================================================\n\n========================================================================\nIV.1. Linux\n========================================================================\n\n========================================================================\nIV.1.1. Exim\n========================================================================\n\nDebian 8.5\n\nCrude exploitation\n\nOur first exploit, a Local Privilege Escalation against Exim\u0027s SUID-root\nPIE (Position-Independent Executable) on i386 Debian 8.5, simply follows\nthe four sequential steps outlined in II.3. \n\nStep 1: Clash the stack with the heap\n\nTo reach the start of the stack with the end of the heap (man brk), we\npermanently leak memory through multiple -p command-line arguments that\nare malloc()ated by Exim but never free()d (CVE-2017-1000369) -- we call\nsuch a malloc()ated chunk of heap memory a \"memleak-chunk\". \n\nBecause the -p argument strings are originally allocated on the stack by\nexecve(), we must cover half of the initial heap-stack distance (between\nthe start of the heap and the end of the stack) with stack memory, and\nhalf of this distance with heap memory. \n\nIf we set the RLIMIT_STACK to 136MB (MIN_GAP, arch/x86/mm/mmap.c) then\nthe initial heap-stack distance is minimal (randomized in a [96MB,137MB]\nrange), but we cannot reach the stack with the heap because of the 1/4\nlimit imposed by the kernel on the argument and environment strings (man\nexecve): 136MB/4=34MB of -p argument strings cannot cover 96MB/2=48MB,\nhalf of the minimum heap-stack distance. \n\nMoreover, if we increase the RLIMIT_STACK, the initial heap-stack\ndistance also increases and we still cannot reach the stack with the\nheap. However, if we set the RLIMIT_STACK to RLIM_INFINITY (4GB on i386)\nthen the kernel switches from the default top-down mmap() layout to a\nlegacy bottom-up mmap() layout, and:\n\n- the initial heap-stack distance is approximately 2GB, because the\n start of the heap (the initial brk()) is randomized above the address\n 0x40000000, and the end of the stack is randomized below the address\n 0xC0000000;\n\n- we can reach the stack with the heap, despite the 1/4 limit imposed by\n the kernel on the argument and environment strings, because 4GB/4=1GB\n of -p argument strings can cover 2GB/2=1GB, half of the initial\n heap-stack distance;\n\n- we clash the stack with the heap around the address 0x80000000. \n\nStep 2: Move the stack-pointer (esp) to the start of the stack\n\nThe 256KB stack-based group_list[] in Exim\u0027s main() naturally consumes\nthe 128KB of initial stack expansion, as mentioned in II.3.2. \n\nStep 3: Jump over the stack guard-page and into the heap\n\nTo move esp from the start of the stack into the heap, without accessing\nthe stack guard-page, we use a malformed -d command-line argument that\nis written to the 32KB (STRING_SPRINTF_BUFFER_SIZE) stack-based buffer\nin Exim\u0027s string_sprintf() function. This buffer is not fully written to\nand hence does not access the stack guard-page, because our -d argument\nstring is much shorter than 32KB. \n\nStep 4a: Smash the stack with the heap\n\nBefore string_sprintf() returns (and moves esp from the heap back into\nthe stack) it calls string_copy(), which malloc()ates and memcpy()es our\n-d argument string to the end of the heap, where esp still points to --\nwe call this malloc()ated chunk of heap memory the \"smashing-chunk\". \n\nThis call to memcpy() therefore smashes its own stack-frame (which is\nnot protected by SSP) with the contents of our smashing-chunk, and we\noverwrite memcpy()\u0027s return-address with the address of libc\u0027s system()\nfunction (which is not randomized by ASLR because Debian 8.5 is\nvulnerable to CVE-2016-3672):\n\n- instead of smashing memcpy()\u0027s stack-frame with an 8-byte pattern (the\n return-address to system() and its argument) we smash it with a simple\n 4-byte pattern (the return-address to system()), append \".\" to the\n PATH environment variable, and symlink() our exploit to the string\n that begins at the address of libc\u0027s system() function;\n\n- system() does not drop our escalated root privileges, because Debian\u0027s\n /bin/sh is dash, not bash and its -p option (man bash). \n\nThis first version of our Exim exploit obtained a root-shell after\nnearly a week of failed attempts; to improve this result, we analyzed\nevery step of a successful run. \n\nRefined exploitation\n\nStep 1: Clash the stack with the heap\n\n+ The heap must be able to reach the stack [Condition 1]\n\nThe start of the heap is randomized in the 32MB range above the end of\nExim\u0027s PIE (the end of its .bss section), but the growth of the heap is\nsometimes blocked by libraries that are mmap()ed within the same range\n(because of the legacy bottom-up mmap() layout). On Debian 8.5, Exim\u0027s\nlibraries occupy about 8MB and thus block the growth of the heap with a\nprobability of 8MB/32MB = 1/4. \n\nWhen the heap is blocked by the libraries, malloc() switches from brk()\nto mmap()s of 1MB (MMAP_AS_MORECORE_SIZE), and our memory leak reaches\nthe stack with mmap()s instead of the heap. Such a stack-clash is also\nexploitable, but its probability of success is low, as detailed in\nIV.1.6., and we therefore discarded this approach. \n\n+ The heap must always reach the stack, when not blocked by libraries\n\nBecause the initial heap-stack distance (between the start of the heap\nand the end of the stack) is a random variable:\n\n- either we allocate the exact amount of heap memory to cover the mean\n heap-stack distance, but the probability of success of this approach\n is low and we therefore discarded it;\n\n- or we allocate enough heap memory to always reach the stack, even when\n the initial heap-stack distance is maximal; after the heap reaches the\n stack, our memory leak allocates mmap()s of 1MB above the stack (below\n 0xC0000000) and below the heap (above the libraries), but it must not\n exhaust the address-space (the 1GB below 0x40000000 is unmappable);\n\n- the final heap-stack distance (between the end of the heap and the\n start of the stack) is also a random variable:\n\n . its minimum value is 8KB (the stack guard-page, plus a safety page\n imposed by the brk() system-call in mm/mmap.c);\n\n . its maximum value is roughly the size of a memleak-chunk, plus 128KB\n (DEFAULT_TOP_PAD, malloc/malloc.c). \n\nStep 3: Jump over the stack guard-page and into the heap\n\n- The stack-pointer must jump over the guard-page and land into the free\n chunk at the end of the heap (the remainder of the heap after malloc()\n switches from brk() to mmap()), where both the smashing-chunk and\n memcpy()\u0027s stack-frame are allocated and overwritten in Step 4a\n [Condition 2];\n\n- The write (of approximately smashing-chunk bytes) to\n string_sprintf()\u0027s stack-based buffer (which starts where the\n guard-page jump lands) must not crash into the end of the heap\n [Condition 3]. \n\nStep 4a: Smash the stack with the heap\n\nThe smashing-chunk must be allocated into the free chunk at the end of\nthe heap:\n\n- the smashing-chunk must not be allocated into the free chunks left\n over at the end of the 1MB mmap()s [Condition 4];\n\n- the memleak-chunks must not be allocated into the free chunk at the\n end of the heap [Condition 5]. \n\nIntuitively, the probability of gaining control of eip depends on the\nsize of the smashing-chunk (the guard-page jump\u0027s landing-zone) and the\nsize of the memleak-chunks (which determines the final heap-stack\ndistance). \n\nTo maximize this probability, we wrote a helper program that imposes the\nfollowing conditions on the smashing-chunk and memleak-chunks:\n\n- the smashing-chunk must be smaller than 32KB\n (STRING_SPRINTF_BUFFER_SIZE) [Condition 3];\n\n- the memleak-chunks must be smaller than 128KB (DEFAULT_MMAP_THRESHOLD,\n malloc/malloc.c);\n\n- the free chunk at the end of the heap must be larger than twice the\n smashing-chunk size [Conditions 2 and 3];\n\n- the free chunk at the end of the heap must be smaller than the\n memleak-chunk size [Condition 5];\n\n- when the final heap-stack distance is minimal, the 32KB\n (STRING_SPRINTF_BUFFER_SIZE) guard-page jump must land below the free\n chunk at the end of the heap [Condition 2];\n\n- the free chunks at the end of the 1MB mmap()s must be:\n\n . either smaller than the smashing-chunk [Condition 4];\n\n . or larger than the free chunk at the end of the heap (glibc\u0027s\n malloc() is a best-fit allocator) [Condition 4]. \n\nThe resulting smashing-chunk and memleak-chunk sizes are:\n\nsmash: 10224 memleak: 27656 brk_min: 20464 brk_max: 24552 mmap_top: 25304\nprobability: 1/16 (0.06190487817)\n\nIn theory, the probability of gaining control of eip is 1/21: the\nproduct of the 1/16 probability calculated by this helper program\n(approximately (smashing-chunk / (memleak-chunk + DEFAULT_TOP_PAD))) and\nthe 3/4 probability of reaching the stack with the heap [Condition 1]. \n\nIn practice, on Debian 8.5, our final Exim exploit:\n\n- gains eip control in 1 run out of 28, on average;\n\n- takes 2.5 seconds per run (on a 4GB Virtual Machine);\n\n- has a good chance of obtaining a root-shell after 28*2.5 = 70 seconds;\n\n- uses 4GB of memory (2GB in the Exim process, and 2GB in the process\n fork()ed by system()). \n\nDebian 8.6\n\nUnlike Debian 8.5, Debian 8.6 is not vulnerable to CVE-2016-3672: after\ngaining eip control in Step 4a (Smash), the probability of successfully\nreturning-into-libc\u0027s system() function is 1/256 (8 bits of entropy --\nlibraries are randomized in a 1MB range but aligned on 4KB). \n\nConsequently, our final Exim exploit has a good chance of obtaining a\nroot-shell on Debian 8.6 after 256*28*2.5 seconds = 5 hours (256*28=7168\nruns). \n\nAs we were drafting this advisory, we tried an alternative approach\nagainst Exim on Debian 8.6: we discovered that its stack is executable,\nbecause it depends on libgnutls-deb0, which depends on libp11-kit, which\ndepends on libffi, which incorrectly requires an executable GNU_STACK\n(CVE-2017-1000376). \n\nInitially, we discarded this approach because our 1GB of -p argument\nstrings on the stack is not executable (_dl_make_stack_executable() only\nmprotect()s the stack below argv[] and envp[]):\n\n41e00000-723d7000 rw-p 00000000 00:00 0 [heap]\n802f1000-80334000 rwxp 00000000 00:00 0 [stack]\n80334000-bfce6000 rw-p 00000000 00:00 0\n\nand because the stack is randomized in an 8MB range but we do not\ncontrol the contents of any large buffer on the executable stack. \n\nLater, we discovered that two 128KB (MAX_ARG_STRLEN) copies of the\nLD_PRELOAD environment variable can be allocated onto the executable\nstack by ld.so\u0027s dl_main() and open_path() functions, automatically\nfreed upon return from these functions, and re-allocated (but not\noverwritten) by Exim\u0027s 256KB stack-based group_list[]. \n\nIn theory, the probability of returning into our shell-code (into these\nexecutable copies of LD_PRELOAD) is 1/32 (2*128KB/8MB), higher than the\n1/256 probability of returning-into-libc. In practice, this alternative\nExim exploit has a good chance of obtaining a root-shell after 1174 runs\n-- instead of 32*28=896 runs in theory, because the two 128KB copies of\nLD_PRELOAD are never perfectly aligned with Exim\u0027s 256KB group_list[] --\nor 1174*2.5 seconds = 50 minutes. \n\nDebian 9 and 10\n\nUnlike Debian 8, Debian 9 and 10 are not vulnerable to offset2lib, a\nminor weakness in Linux\u0027s ASLR that coincidentally affects Step 1\n(Clash) of our stack-clash exploits:\n\nhttps://cybersecurity.upv.es/attacks/offset2lib/offset2lib.html\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1fd836dcf00d2028c700c7e44d2c23404062c90\n\nIf we set RLIMIT_STACK to RLIM_INFINITY, the kernel still switches to\nthe legacy bottom-up mmap() layout, and the libraries are randomized in\nthe 1MB range above the address 0x40000000, but Exim\u0027s PIE is randomized\nin the 1MB range above the address 0x80000000 and the heap is randomized\nin the 32MB range above the PIE\u0027s .bss section. As a result:\n\n- the heap is always able to reach the stack, because its growth is\n never blocked by the libraries -- the theoretical probability of\n gaining eip control is 1/16, the probability calculated by our helper\n program;\n\n- the heap clashes with the stack around the address 0xA0000000, because\n the initial heap-stack distance is 1GB (0xC0000000-0x80000000) and can\n be covered with 512MB of heap memory and 512MB of stack memory. \n\nRemote exploitation\n\nExim\u0027s string_sprintf() or glibc\u0027s vfprintf() can be used to remotely\ncomplete Steps 3 and 4 of the stack-clash; and the 256KB group_list[] in\nExim\u0027s main() naturally consumes the 128KB of initial stack expansion in\nStep 2; but another 256KB group_list[] in Exim\u0027s exim_setugid() further\ndecreases the start address of the stack and prevents us from remotely\ncompleting Step 2 and exploiting Exim. \n\n========================================================================\nIV.1.2. Sudo\n========================================================================\n\nIntroduction\n\nWe discovered a vulnerability in Sudo\u0027s get_process_ttyname() for Linux:\nthis function opens \"/proc/[pid]/stat\" (man proc) and reads the device\nnumber of the tty from field 7 (tty_nr). Unfortunately, these fields are\nspace-separated and field 2 (comm, the filename of the command) can\ncontain spaces (CVE-2017-1000367). \n\nFor example, if we execute Sudo through the symlink \"./ 1 \",\nget_process_ttyname() calls sudo_ttyname_dev() to search for the\nnon-existent tty device number \"1\" in the built-in search_devs[]. \n\nNext, sudo_ttyname_dev() calls the recursive function\nsudo_ttyname_scan() to search for this non-existent tty device number\n\"1\" in a breadth-first traversal of \"/dev\". \n\nLast, we exploit this recursive function during its traversal of the\nworld-writable \"/dev/shm\", and allocate hundreds of megabytes of heap\nmemory from the filesystem (directory pathnames) instead of the stack\n(the command-line arguments and environment variables allocated by our\nother stack-clash exploits). \n\nStep 1: Clash the stack with the heap\n\nsudo_ttyname_scan() strdup()licates the pathnames of the directories and\nsub-directories that it traverses, but does not free() them until it\nreturns. Each one of these \"memleak-chunks\" allocates at most 4KB\n(PATH_MAX) of heap memory. \n\nStep 2: Move the stack-pointer to the start of the stack\n\nThe recursive calls to sudo_ttyname_scan() allocate 4KB (PATH_MAX)\nstack-frames that naturally consume the 128KB of initial stack\nexpansion. \n\nStep 3: Jump over the stack guard-page and into the heap\n\nIf the length of a directory pathname reaches 4KB (PATH_MAX),\nsudo_ttyname_scan() calls warning(), which calls strerror() and _(),\nwhich call gettext() and allow us to jump over the stack guard-page with\nan alloca() of up to 128KB (the LANGUAGE environment variable), as\nexplained in II.3.3. \n\nStep 4a: Smash the stack with the heap\n\nThe self-contained gettext() exploitation method malloc()ates and\nmemcpy()es a \"smashing-chunk\" of up to 128KB (the OUTPUT_CHARSET\nenvironment variable) that smashes memcpy()\u0027s stack-frame and\nreturn-address, as explained in II.3.4. \n\nDebian 8.5\n\nStep 1: Clash the stack with the heap\n\nDebian 8.5 is vulnerable to CVE-2016-3672: if we set RLIMIT_STACK to\nRLIM_INFINITY, the kernel switches to the legacy bottom-up mmap() layout\nand disables the ASLR of Sudo\u0027s PIE and libraries, but still the initial\nheap-stack distance is randomized and roughly 2GB (0xC0000000-0x40000000\n-- the start of the heap is randomized in a 32MB range above 0x40000000,\nand the end of the stack is randomized in the 8MB range below\n0xC0000000). \n\nTo reach the start of the stack with the end of the heap, we allocate\nhundreds of megabytes of heap memory from the filesystem (directory\npathnames), and:\n\n- the heap must be able to reach the stack -- on Debian 8.5, Sudo\u0027s\n libraries occupy about 3MB and hence block the growth of the heap with\n a probability of 3MB/32MB ~= 1/11;\n\n- when not blocked by the libraries, the heap must always reach the\n stack, even when the initial heap-stack distance is maximal (as\n detailed in IV.1.1.);\n\n- we cover half of the initial heap-stack distance with 1GB of heap\n memory (the memleak-chunks, strdup()licated directory pathnames);\n\n- we cover the other half of this distance with 1GB of stack memory (the\n maximum permitted by the kernel\u0027s 1/4 limit on the argument and\n environment strings) and thus reduce our on-disk inode usage;\n\n- we redirect sudo_ttyname_scan()\u0027s traversal of /dev to /var/tmp\n (through a symlink planted in /dev/shm) to work around the small\n number of inodes available in /dev/shm. \n\nAfter the heap reaches the stack and malloc() switches from brk() to\nmmap()s of 1MB:\n\n- the size of the free chunk left over at the end of the heap is a\n random variable in the [0B,4KB] range -- 4KB (PATH_MAX) is the\n approximate size of a memleak-chunk;\n\n- the final heap-stack distance (between the end of the heap and the\n start of the stack) is a random variable in the [8KB,4KB+128KB=132KB]\n range -- the size of a memleak-chunk plus 128KB (DEFAULT_TOP_PAD);\n\n- sudo_ttyname_scan() recurses a few more times and therefore allocates\n more stack memory, but this stack expansion is blocked by the heap and\n crashes into the stack guard-page after 16 recursions on average\n (132KB/4KB/2, where 132KB is the maximum final heap-stack distance,\n and 4KB is the size of sudo_ttyname_scan()\u0027s stack-frame). \n\nTo solve this unexpected problem, we:\n\n- first, redirect sudo_ttyname_scan() to a directory tree \"A\" in\n /var/tmp that recurses and allocates stack memory, but does not\n allocate heap memory (each directory level contains only one entry,\n the sub-directory that is connected to the next directory level);\n\n- second, redirect sudo_ttyname_scan() to a directory tree \"B\" in\n /var/tmp that recurses and allocates heap memory (each directory level\n contains many entries), but does not allocate more stack memory (it\n simply consumes the stack memory that was already allocated by the\n directory tree \"A\"): it does not further expand the stack, and does\n not crash into the guard-page. \n\nFinally, we increase the speed of our exploit and avoid thousands of\nuseless recursions:\n\n- in each directory level traversed by sudo_ttyname_scan(), we randomly\n modify the names of its sub-directories until the first call to\n readdir() returns the only sub-directory that is connected to the next\n level of the directory tree (all other sub-directories allocate heap\n memory but are otherwise empty);\n\n- we dup2() Sudo\u0027s stdout and stderr to a pipe with no readers that\n terminates Sudo with a SIGPIPE if sudo_ttyname_scan() calls warning()\n and sudo_printf() (a failed exploit attempt, usually because the final\n heap-stack distance is much longer or shorter than the guard-page\n jump). \n\nStep 2: Move the stack-pointer to the start of the stack\n\nsudo_ttyname_scan() allocates a 4KB (PATH_MAX) stack-based pathbuf[]\nthat naturally consumes the 128KB of initial stack expansion in fewer\nthan 128KB/4KB=32 recursive calls. \n\nThe recursive calls to sudo_ttyname_scan() allocate less than 8MB of\nstack memory: the maximum number of recursions (PATH_MAX / strlen(\"/a\")\n= 2K) multiplied by the size of sudo_ttyname_scan()\u0027s stack-frame (4KB). \n\nStep 3: Jump over the stack guard-page and into the heap\n\nThe length of the guard-page jump in gettext() is the length of the\nLANGUAGE environment variable (at most 128KB, MAX_ARG_STRLEN): we take a\n64KB jump, well within the range of the final heap-stack distance; this\njump then lands into the free chunk at the end of the heap, where the\nsmashing-chunk will be allocated in Step 4a, with a probability of\n(smashing-chunk / (memleak-chunk + DEFAULT_TOP_PAD)). \n\nIf available, we assign \"C.UTF-8\" to the LC_ALL environment variable,\nand prepend \"be\" to our 64KB LANGUAGE environment variable, because\nthese minimal locales do not interfere with our heap feng-shui. \n\nStep 4a: Smash the stack with the heap\n\nIn gettext(), the smashing-chunk (a malloc() and memcpy() of the\nOUTPUT_CHARSET environment variable) must be allocated into the free\nchunk at the end of the heap, where the stack-frame of memcpy() is also\nallocated. \n\nFirst, if the size of our memleak-chunks is exactly 4KB+8B\n(PATH_MAX+MALLOC_ALIGNMENT), then:\n\n- the size of the free chunk at the end of the heap is a random variable\n in the [0B,4KB] range;\n\n- the size of the free chunks left over at the end of the 1MB mmap()s is\n roughly 1MB%(4KB+8B)=2KB. \n\nSecond, if the size of our smashing-chunk is about 2KB+256B\n(PATH_MAX/2+NAME_MAX), then:\n\n- it is always larger than (and never allocated into) the free chunks at\n the end of the 1MB mmap()s;\n\n- it is smaller than (and allocated into) the free chunk at the end of\n the heap with a probability of roughly 1-(2KB+256B)/4KB. \n\nLast, in each level of our directory tree \"B\", sudo_ttyname_scan()\nmalloc()ates and realloc()ates an array of pointers to sub-directories,\nbut these realloc()s prevent the smashing-chunk from being allocated\ninto the free chunk at the end of the heap:\n\n- they create holes in the heap, where the smashing-chunk may be\n allocated to;\n\n- they may allocate the free chunk at the end of the heap, where the\n smashing-chunk should be allocated to. \n\nTo solve these problems, we carefully calculate the number of\nsub-directories in each level of our directory tree \"B\":\n\n- we limit the size of the realloc()s -- and hence the size of the holes\n that they create -- to 4KB+2KB:\n\n . either a memleak-chunk is allocated into such a hole, and the\n remainder is smaller than the smashing-chunk (\"not a fit\");\n\n . or such a hole is not allocated, but it is larger than the largest\n free chunk at the end of the heap (\"a worse fit\");\n\n- we gradually reduce the final size of the realloc()s in the last\n levels of our directory tree \"B\", and hence re-allocate the holes\n created in the previous levels. \n\nIn theory, on Debian 8.5, the probability of gaining control of eip is\napproximately 1/148, the product of:\n\n- (Step 1) the probability of reaching the stack with the heap:\n 1-3MB/32MB;\n\n- (Step 3) the probability of jumping over the stack guard-page and into\n the free chunk at the end of the heap: (2KB+256B) / (4KB+8B + 128KB);\n\n- (Step 4a) the probability of allocating the smashing-chunk into the\n free chunk at the end of the heap: 1-(2KB+256B)/4KB. \n\nIn practice, on Debian 8.5, this Sudo exploit:\n\n- gains eip control in 1 run out of 200, on average;\n\n- takes 2.8 seconds per run (on a 4GB Virtual Machine);\n\n- has a good chance of obtaining a root-shell after 200 * 2.8 seconds =\n 9 minutes;\n\n- uses 2GB of memory. \n\nNote: we do not return-into-libc\u0027s system() in Step 4a because /bin/sh\nmay be bash, which drops our escalated root privileges upon execution. \nInstead, we:\n\n- either return-into-libc\u0027s __gconv_find_shlib() function through\n find_module(), which loads this function\u0027s argument from -0x20(%ebp);\n\n- or return-into-libc\u0027s __libc_dlopen_mode() function through\n nss_load_library(), which loads this function\u0027s argument from\n -0x1c(%ebp);\n\n- search the libc for a relative pathname that contains a slash\n character (for example, \"./fork.c\") and pass its address to\n __gconv_find_shlib() or __libc_dlopen_mode();\n\n- symlink() our PIE exploit to this pathname, and let Sudo execute our\n _init() constructor as root, upon successful exploitation. \n\nDebian 8.6\n\nUnlike Debian 8.5, Debian 8.6 is not vulnerable to CVE-2016-3672: Sudo\u0027s\nPIE and libraries are always randomized, even if we set RLIMIT_STACK to\nRLIM_INFINITY; the probability of successfully returning-into-libc,\nafter gaining eip control in Step 4a (Smash), is 1/256. \n\nHowever, Debian 8.6 is still vulnerable to offset2lib, the minor\nweakness in Linux\u0027s ASLR that coincidentally affects Step 1 (Clash) of\nour stack-clash exploits:\n\n- if we set RLIMIT_STACK to 136MB (MIN_GAP) or less (the default is\n 8MB), then the initial heap-stack distance (between the start of the\n heap and the end of the stack) is minimal, a random variable in the\n [96MB,137MB] range;\n\n- instead of allocating 1GB of heap memory and 1GB of stack memory to\n clash the stack with the heap, we merely allocate 137MB of heap memory\n (directory pathnames from our directory tree \"B\") and no stack memory. \n\nIn theory, on Debian 8.6, the probability of gaining eip control is\n1/134 (instead of 1/148 on Debian 8.5) because the growth of the heap is\nnever blocked by Sudo\u0027s libraries; and in practice, this Sudo exploit\ntakes only 0.15 second per run (instead of 2.8 on Debian 8.5). \n\nIndependent exploitation\n\nThe vulnerability that we discovered in Sudo\u0027s get_process_ttyname()\nfunction for Linux (CVE-2017-1000367) is exploitable independently of\nits stack-clash repercussions: through this vulnerability, a local user\ncan pretend that his tty is any character device on the filesystem, and\nafter two race conditions, he can pretend that his tty is any file on\nthe filesystem. \n\nOn an SELinux-enabled system, if a user is Sudoer for a command that\ndoes not grant him full root privileges, he can overwrite any file on\nthe filesystem (including root-owned files) with this command\u0027s output,\nbecause relabel_tty() (in src/selinux.c) calls open(O_RDWR|O_NONBLOCK)\non his tty and dup2()s it to the command\u0027s stdin, stdout, and stderr. \n\nTo exploit this vulnerability, we:\n\n- create a directory \"/dev/shm/_tmp\" (to work around\n /proc/sys/fs/protected_symlinks), and a symlink \"/dev/shm/_tmp/_tty\"\n to a non-existent pty \"/dev/pts/57\", whose device number is 34873;\n\n- run Sudo through a symlink \"/dev/shm/_tmp/ 34873 \" that spoofs the\n device number of this non-existent pty;\n\n- set the flag CD_RBAC_ENABLED through the command-line option \"-r role\"\n (where \"role\" can be our current role, for example \"unconfined_r\");\n\n- monitor our directory \"/dev/shm/_tmp\" (for an IN_OPEN inotify event)\n and wait until Sudo opendir()s it (because sudo_ttyname_dev() cannot\n find our non-existent pty in \"/dev/pts/\");\n\n- SIGSTOP Sudo, call openpty() until it creates our non-existent pty,\n and SIGCONT Sudo;\n\n- monitor our directory \"/dev/shm/_tmp\" (for an IN_CLOSE_NOWRITE inotify\n event) and wait until Sudo closedir()s it;\n\n- SIGSTOP Sudo, replace the symlink \"/dev/shm/_tmp/_tty\" to our\n now-existent pty with a symlink to the file that we want to overwrite\n (for example \"/etc/passwd\"), and SIGCONT Sudo;\n\n- control the output of the command executed by Sudo (the output that\n overwrites \"/etc/passwd\"):\n\n . either through a command-specific method;\n\n . or through a general method such as \"--\\nHELLO\\nWORLD\\n\" (by\n default, getopt() prints an error message to stderr if it does not\n recognize an option character). \n\nTo reliably win the two SIGSTOP races, we preempt the Sudo process: we\nsetpriority() it to the lowest priority, sched_setscheduler() it to\nSCHED_IDLE, and sched_setaffinity() it to the same CPU as our exploit. \n\n[john@localhost ~]$ head -n 8 /etc/passwd\nroot:x:0:0:root:/root:/bin/bash\nbin:x:1:1:bin:/bin:/sbin/nologin\ndaemon:x:2:2:daemon:/sbin:/sbin/nologin\nadm:x:3:4:adm:/var/adm:/sbin/nologin\nlp:x:4:7:lp:/var/spool/lpd:/sbin/nologin\nsync:x:5:0:sync:/sbin:/bin/sync\nshutdown:x:6:0:shutdown:/sbin:/sbin/shutdown\nhalt:x:7:0:halt:/sbin:/sbin/halt\n\n[john@localhost ~]$ sudo -l\n[sudo] password for john:\n... \nUser john may run the following commands on localhost:\n (ALL) /usr/bin/sum\n\n[john@localhost ~]$ ./Linux_sudo_CVE-2017-1000367 /usr/bin/sum $\u0027--\\nHELLO\\nWORLD\\n\u0027\n[sudo] password for john:\n\n[john@localhost ~]$ head -n 8 /etc/passwd\n/usr/bin/sum: unrecognized option \u0027--\nHELLO\nWORLD\n\u0027\nTry \u0027/usr/bin/sum --help\u0027 for more information. \nogin\nadm:x:3:4:adm:/var/adm:/sbin/nologin\nlp:x:4:7:lp:/var/spool/lpd:/sbin/nologin\n\n========================================================================\nIV.1.3. ld.so \"hwcap\" exploit\n========================================================================\n\n\"ld.so and ld-linux.so* find and load the shared libraries needed by a\nprogram, prepare the program to run, and then run it.\" (man ld.so)\n\nThrough ld.so, most SUID and SGID binaries on most i386 Linux\ndistributions are exploitable. For example: Debian 7, 8, 9, 10; Fedora\n23, 24, 25; CentOS 5, 6, 7. \n\nDebian 8.5\n\nStep 1: Clash the stack with anonymous mmap()s\n\nThe minimal malloc() implementation in ld.so calls mmap(), not brk(), to\nobtain memory from the system, and it never calls munmap(). To reach the\nstart of the stack with anonymous mmap()s, we:\n\n- set RLIMIT_STACK to RLIM_INFINITY and switch from the default top-down\n mmap() layout to the legacy bottom-up mmap() layout;\n\n- cover half of the initial mmap-stack distance\n (0xC0000000-0x40000000=2GB) with 1GB of stack memory (the maximum\n permitted by the kernel\u0027s 1/4 limit on the argument and environment\n strings);\n\n- cover the other half of this distance with 1GB of anonymous mmap()s,\n through multiple LD_AUDIT environment variables that permanently leak\n millions of audit_list structures (CVE-2017-1000366) in\n process_envvars() and process_dl_audit() (elf/rtld.c). \n\nStep 2: Move the stack-pointer to the start of the stack\n\nTo consume the 128KB of initial stack expansion, we simply pass 128KB of\nargv[] and envp[] pointers to execve(), as explained in II.3.2. \n\nStep 3: Jump over the stack guard-page and into the anonymous mmap()s\n\n_dl_init_paths() (elf/dl-load.c), which is called by dl_main() after\nprocess_envvars(), alloca()tes llp_tmp, a stack-based buffer large\nenough to hold the LD_LIBRARY_PATH environment variable and any\ncombination of Dynamic String Token (DST) replacement strings. To\ncalculate the size of llp_tmp, _dl_init_paths() must:\n\n- first, scan LD_LIBRARY_PATH and count all DSTs ($LIB, $PLATFORM, and\n $ORIGIN);\n\n- second, multiply the number of DSTs by the length of the longest DST\n replacement string (on Debian, $LIB is replaced by the 18-char-long\n \"lib/i386-linux-gnu\", $PLATFORM by \"i386\" or \"i686\", and $ORIGIN by\n the pathname of the program\u0027s directory, for example \"/bin\" or\n \"/usr/sbin\" -- the longest DST replacement string is usually\n \"lib/i386-linux-gnu\");\n\n- last, add the length of the original LD_LIBRARY_PATH. \n\nConsequently, if LD_LIBRARY_PATH contains many DSTs that are replaced by\nthe shortest DST replacement string, then llp_tmp is large but not fully\nwritten to, and can be used to jump over the stack guard-page and into\nthe anonymous mmap()s. \n\nOur ld.so exploits do not use $ORIGIN because it is ignored by several\ndistributions and glibc versions; for example:\n\n2010-12-09 Andreas Schwab \u003cschwab@redhat.com\u003e\n\n * elf/dl-object.c (_dl_new_object): Ignore origin of privileged\n program. \n\nIndex: glibc-2.12-2-gc4ccff1/elf/dl-object.c\n===================================================================\n--- glibc-2.12-2-gc4ccff1.orig/elf/dl-object.c\n+++ glibc-2.12-2-gc4ccff1/elf/dl-object.c\n@@ -214,6 +214,9 @@ _dl_new_object (char *realname, const ch\n out:\n new-\u003el_origin = origin;\n }\n+ else if (INTUSE(__libc_enable_secure) \u0026\u0026 type == lt_executable)\n+ /* The origin of a privileged program cannot be trusted. */\n+ new-\u003el_origin = (char *) -1;\n\n return new;\n }\n\nStep 4b: Smash an anonymous mmap() with the stack\n\nBefore _dl_init_paths() returns to dl_main() and jumps back from the\nanonymous mmap()s into the stack, we overwrite the block of mmap()ed\nmemory malloc()ated by _dl_important_hwcaps() with the contents of the\nstack-based buffer llp_tmp. \n\n- The block of memory malloc()ated by _dl_important_hwcaps() is divided\n in two:\n\n . The first part (the \"hwcap-pointers\") is an array of r_strlenpair\n structures that point to the hardware-capability strings stored in\n the second part of this memory block. The second part (the \"hwcap-strings\") contains strings of\n hardware-capabilities that are appended to the pathnames of trusted\n directories, such as \"/lib/\" and \"/lib/i386-linux-gnu/\", when\n open_path() searches for audit libraries (LD_AUDIT), preload\n libraries (LD_PRELOAD), or dependent libraries (DT_NEEDED). \n\n For example, on Debian, when open_path() finds \"libc.so.6\" in\n \"/lib/i386-linux-gnu/i686/cmov/\", \"i686/cmov/\" is such a\n hardware-capability string. \n\n- To overwrite the block of memory malloc()ated by\n _dl_important_hwcaps() with the contents of the stack-based buffer\n llp_tmp, we divide our LD_LIBRARY_PATH environment variable in two:\n\n . The first, static part (our \"good-write\") overwrites the first\n hardware-capability string with characters that we do control. The second, dynamic part (our \"bad-write\") overwrites the last\n hardware-capability strings with characters that we do not control\n (the short DST replacement strings that enlarge llp_tmp and allow us\n to jump over the stack guard-page). \n\nIf our 16-byte-aligned good-write overwrites the 8-byte-aligned first\nhardware-capability string with the 8-byte pattern \"/../tmp/\", and if we\nappend the trusted directory \"/lib\" to our LD_LIBRARY_PATH, then (after\n_dl_init_paths() returns to dl_main()):\n\n- dlmopen_doit() tries to load an LD_AUDIT library \"a\" (our memory leak\n from Step 1);\n\n- _dl_map_object() searches for \"a\" in the trusted directory \"/lib\" from\n our LD_LIBRARY_PATH;\n\n- open_path() finds our library \"a\" in \"/lib//../tmp//../tmp//../tmp/\"\n because we overwrote the first hardware-capability string with the\n pattern \"/../tmp/\";\n\n- dl_open_worker() executes our library\u0027s _init() constructor, as root. \n\nIn theory, this exploit\u0027s probability of success depends on:\n\n- (event A) the size of rtld_search_dirs.dirs[0], an array of\n r_search_path_elem structures that are malloc()ated by\n _dl_init_paths() after the _dl_important_hwcaps(), and must be\n allocated above the stack (below 0xC0000000), not below the stack\n where it would interfere with Steps 3 (Jump) and 4b (Smash):\n\nP(A) = 1 - size of rtld_search_dirs.dirs[0] / max stack randomization\n\n- (event B) the size of the hwcap-pointers and the size of our\n good-write, which must overwrite the first hardware-capability string,\n but not the first hardware-capability pointer (to this string):\n\nP(B|A) = MIN(size of hwcap-pointers, size of good-write) /\n (max stack randomization - size of rtld_search_dirs.dirs[0])\n\n- (event C) the size of the hwcap-strings and the size of our bad-write,\n which must not write past the end of hwcap-strings; but we guarantee\n that size of hwcap-strings \u003e= size of good-write + size of bad-write:\n\nP(C|B) = 1\n\nIn practice, we use the LD_HWCAP_MASK environment variable to maximize\nthis exploit\u0027s probability of success, because:\n\n- the size of the hwcap-pointers -- which act as a cushion that absorbs\n the excess of good-write without crashing,\n\n- the size of the hwcap-strings -- which act as a cushion that absorbs\n the excess of good-write and bad-write without crashing,\n\n- and the size of rtld_search_dirs.dirs[0],\n\nare all proportional to 2^N, where N is the number of supported\nhardware-capabilities that we enable in LD_HWCAP_MASK. \n\nFor example, on Debian 8.5, this exploit:\n\n- has a 1/151 probability of success;\n\n- takes 5.5 seconds per run (on a 4GB Virtual Machine);\n\n- has a good chance of obtaining a root-shell after 151 * 5.5 seconds =\n 14 minutes. \n\nDebian 8.6\n\nUnlike Debian 8.5, Debian 8.6 is not vulnerable to CVE-2016-3672, but\nour ld.so \"hwcap\" exploit is a data-only attack and is not affected by\nthe ASLR of the libraries and PIEs. \n\nDebian 9 and 10\n\nUnlike Debian 8, Debian 9 and 10 are not vulnerable to offset2lib: if we\nset RLIMIT_STACK to RLIM_INFINITY, the libraries are randomized above\nthe address 0x40000000, but the PIE is randomized above 0x80000000\n(instead of 0x40000000 before the offset2lib patch). \n\nUnfortunately, we discovered a vulnerability in the offset2lib patch\n(CVE-2017-1000370): if the PIE is execve()d with 1GB of argument or\nenvironment strings (the maximum permitted by the kernel\u0027s 1/4 limit)\nthen the stack occupies the address 0x80000000, and the PIE is mapped\nabove the address 0x40000000 instead, directly below the libraries. \nThis vulnerability effectively nullifies the offset2lib patch, and\nallows us to reuse our Debian 8 exploit against Debian 9 and 10. \n\n$ ./Linux_offset2lib\nRun #1... \nCVE-2017-1000370 triggered\n40076000-40078000 r-xp 00000000 00:26 25041 /tmp/Linux_offset2lib\n40078000-40079000 r--p 00001000 00:26 25041 /tmp/Linux_offset2lib\n40079000-4009b000 rw-p 00002000 00:26 25041 /tmp/Linux_offset2lib\n4009b000-400c0000 r-xp 00000000 fd:00 8463588 /usr/lib/ld-2.24.so\n400c0000-400c1000 r--p 00024000 fd:00 8463588 /usr/lib/ld-2.24.so\n400c1000-400c2000 rw-p 00025000 fd:00 8463588 /usr/lib/ld-2.24.so\n400c2000-400c4000 r--p 00000000 00:00 0 [vvar]\n400c4000-400c6000 r-xp 00000000 00:00 0 [vdso]\n400c6000-400c8000 rw-p 00000000 00:00 0\n400cf000-402a3000 r-xp 00000000 fd:00 8463595 /usr/lib/libc-2.24.so\n402a3000-402a4000 ---p 001d4000 fd:00 8463595 /usr/lib/libc-2.24.so\n402a4000-402a6000 r--p 001d4000 fd:00 8463595 /usr/lib/libc-2.24.so\n402a6000-402a7000 rw-p 001d6000 fd:00 8463595 /usr/lib/libc-2.24.so\n402a7000-402aa000 rw-p 00000000 00:00 0\n7fcf1000-bfcf2000 rw-p 00000000 00:00 0 [stack]\n\nCaveats\n\n- On Fedora and CentOS, this ld.so \"hwcap\" exploit fails against\n /usr/bin/passwd and /usr/bin/chage (but it works against all other\n SUID-root binaries) because of SELinux:\n\ntype=AVC msg=audit(1492091008.983:414): avc: denied { execute } for pid=2169 comm=\"passwd\" path=\"/var/tmp/a\" dev=\"dm-0\" ino=12828063 scontext=unconfined_u:unconfined_r:passwd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=file permissive=0\n\ntype=AVC msg=audit(1492092997.581:487): avc: denied { execute } for pid=2648 comm=\"chage\" path=\"/var/tmp/a\" dev=\"dm-0\" ino=12828063 scontext=unconfined_u:unconfined_r:passwd_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_tmp_t:s0 tclass=file permissive=0\n\n- It fails against recent versions of Sudo that specify an RPATH such as\n \"/usr/lib/sudo\": _dl_map_object() first searches for our LD_AUDIT\n library in RPATH, but open_path() fails to find our library in\n \"/usr/lib/sudo//../tmp/\" and crashes as soon as it reaches an\n overwritten hwcap-pointer. \n\n This problem can be solved by a 16-byte pattern \"///../../../tmp/\"\n (instead of the 8-byte pattern \"/../tmp/\") but the exploit\u0027s\n probability of success would be divided by two. \n\n- On Ubuntu, this ld.so \"hwcap\" exploit always fails, because of the\n following patch:\n\nDescription: pro-actively disable LD_AUDIT for setuid binaries, regardless\n of where the libraries are loaded from. This is to try to make sure that\n CVE-2010-3856 cannot sneak back in. Upstream is unlikely to take this,\n since it limits the functionality of LD_AUDIT. \nAuthor: Kees Cook \u003ckees@ubuntu.com\u003e\n\nIndex: eglibc-2.15/elf/rtld.c\n===================================================================\n--- eglibc-2.15.orig/elf/rtld.c 2012-05-09 10:05:29.456899131 -0700\n+++ eglibc-2.15/elf/rtld.c 2012-05-09 10:38:53.952009069 -0700\n@@ -2529,7 +2529,7 @@\n while ((p = (strsep) (\u0026str, \":\")) != NULL)\n if (p[0] != \u0027\\0\u0027\n \u0026\u0026 (__builtin_expect (! __libc_enable_secure, 1)\n- || strchr (p, \u0027/\u0027) == NULL))\n+ ))\n {\n /* This is using the local malloc, not the system malloc. The\n memory can never be freed. */\n\n========================================================================\nIV.1.4. ld.so \".dynamic\" exploit\n========================================================================\n\nTo exploit ld.so without the LD_AUDIT memory leak, we rely on a second\nvulnerability that we discovered in the offset2lib patch\n(CVE-2017-1000371):\n\nif we set RLIMIT_STACK to RLIM_INFINITY, and allocate nearly 1GB of\nstack memory (the maximum permitted by the kernel\u0027s 1/4 limit on the\nargument and environment strings) then the stack grows down to almost\n0x80000000, and because the PIE is mapped above 0x80000000, the minimum\ndistance between the end of the PIE\u0027s read-write segment and the start\nof the stack is 4KB (the stack guard-page). \n\n$ ./Linux_offset2lib 0x3f800000\nRun #1... \nRun #2... \nRun #3... \nRun #796... \nRun #797... \nRun #798... \nCVE-2017-1000371 triggered\n4007b000-400a0000 r-xp 00000000 fd:00 8463588 /usr/lib/ld-2.24.so\n400a0000-400a1000 r--p 00024000 fd:00 8463588 /usr/lib/ld-2.24.so\n400a1000-400a2000 rw-p 00025000 fd:00 8463588 /usr/lib/ld-2.24.so\n400a2000-400a4000 r--p 00000000 00:00 0 [vvar]\n400a4000-400a6000 r-xp 00000000 00:00 0 [vdso]\n400a6000-400a8000 rw-p 00000000 00:00 0\n400af000-40283000 r-xp 00000000 fd:00 8463595 /usr/lib/libc-2.24.so\n40283000-40284000 ---p 001d4000 fd:00 8463595 /usr/lib/libc-2.24.so\n40284000-40286000 r--p 001d4000 fd:00 8463595 /usr/lib/libc-2.24.so\n40286000-40287000 rw-p 001d6000 fd:00 8463595 /usr/lib/libc-2.24.so\n40287000-4028a000 rw-p 00000000 00:00 0\n8000a000-8000c000 r-xp 00000000 00:26 25041 /tmp/Linux_offset2lib\n8000c000-8000d000 r--p 00001000 00:26 25041 /tmp/Linux_offset2lib\n8000d000-8002f000 rw-p 00002000 00:26 25041 /tmp/Linux_offset2lib\n80030000-bf831000 rw-p 00000000 00:00 0 [heap]\n\nNote: in this example, the \"[stack]\" is incorrectly displayed as the\n\"[heap]\" by show_map_vma() (in fs/proc/task_mmu.c). \n\nThis completes Step 1: we clash the stack with the PIE\u0027s read-write\nsegment; we complete the remaining steps as in the \"hwcap\" exploit:\n\n- Step 2: we consume the initial stack expansion with 128KB of argv[]\n and envp[] pointers;\n\n- Step 3: we jump over the stack guard-page and into the PIE\u0027s\n read-write segment with llp_tmp\u0027s alloca() (in _dl_init_paths());\n\n- Step 4b: we smash the PIE\u0027s read-write segment with llp_tmp\u0027s\n good-write and bad-write (in _dl_init_paths()); we can smash the\n following sections:\n\n + .data and .bss: but we discarded this application-specific approach;\n\n + .got: although protected by Full RELRO (Full RELocate Read-Only,\n GNU_RELRO and BIND_NOW) the .got is still writable when we smash it\n in _dl_init_paths(); however, within ld.so, the .got is written to\n but never read from, and we therefore discarded this approach;\n\n + .dynamic: our favored approach. \n\nOn i386, the .dynamic section is an array of Elf32_Dyn structures (an\nint32 d_tag, and the union of uint32 d_val and uint32 d_ptr) that\ncontains entries such as:\n\n- DT_STRTAB, a pointer to the PIE\u0027s .dynstr section (a read-only string\n table): its d_tag (DT_STRTAB) is read (by elf_get_dynamic_info())\n before we smash it in _dl_init_paths(), but its d_ptr is read (by\n _dl_map_object_deps()) after we smash it in _dl_init_paths();\n\n- DT_NEEDED, an offset into the .dynstr section: the pathname of a\n dependent library that must be loaded by _dl_map_object_deps(). \n\nIf we overwrite the entire .dynamic section with the following 8-byte\npattern (an Elf32_Dyn structure):\n\n- a DT_NEEDED d_tag,\n\n- a d_val equal to half the address of our own string table on the stack\n (16MB of argument strings, enough to defeat the 8MB stack\n randomization),\n\nthen _dl_map_object_deps() reads the pathname of this dependent library\nfrom DT_STRTAB.d_ptr + DT_NEEDED.d_val = our_strtab/2 + our_strtab/2 =\nour_strtab, and loads our own library, as root. This 8-byte pattern is\nsimple, but poses two problems:\n\n- DT_NEEDED is an int32 equal to 1, but we smash the .dynamic section\n with a string copy that cannot contain null-bytes: to solve this first\n problem we use DT_AUXILIARY instead, which is equivalent but equal to\n 0x7ffffffd;\n\n- ld.so crashes before it returns from dl_main() (before it calls\n _dl_init() and executes our library\u0027s _init() constructor):\n\n . in _dl_map_object_deps() because of our DT_AUXILIARY entry;\n\n . in version_check_doit() because we overwrote the DT_VERNEED entry;\n\n . in _dl_relocate_object() because we overwrote the DT_REL, DT_RELSZ,\n and DT_RELCOUNT entries. \n\nTo solve this second problem, we could overwrite the .dynamic section\nwith a more complicated pattern that repairs these entries, but our\nexploit\u0027s probability of success would decrease significantly. \n\nInstead, we take control of ld.so\u0027s execution flow as soon as\n_dl_map_object_deps() loads our library:\n\n- our library contains three executable LOAD segments,\n\n- but only the first and last segments are sanity-checked by\n _dl_map_object_from_fd() and _dl_map_segments(),\n\n- and all segments except the first are mmap()ed with MAP_FIXED by\n _dl_map_segments(),\n\n- so we can mmap() our second segment anywhere -- we mmap() it on top of\n ld.so\u0027s executable segment,\n\n- and return into our own code (instead of ld.so\u0027s) as soon as this\n second mmap() system-call returns. \n\nProbabilities\n\nThe \"hwcap\" exploit taught us that this \".dynamic\" exploit\u0027s probability\nof success depends on:\n\n- the size of the cushion below the .dynamic section, which can absorb\n the excess of \"good-write\" without crashing: the padding bytes between\n the start of the PIE\u0027s read-write segment and the start of its first\n read-write section;\n\n- the size of the cushion above the .dynamic section, which can absorb\n the excess of \"good-write\" and \"bad-write\" without crashing: the .got,\n .data, and .bss sections. \n\nIf we guarantee that (cushion above .dynamic \u003e good-write + bad-write),\nthen the theoretical probability of success is approximately:\n\nMIN(cushion below .dynamic, good-write) / max stack randomization\n\nThe maximum size of the cushion below the .dynamic section is 4KB (one\npage) and hence the maximum probability of success is 4KB/8MB=1/2048. \nIn practice, on Ubuntu 16.04.2:\n\n- the highest probability is 1/2589 (/bin/su) and the lowest probability\n is 1/9225 (/usr/lib/eject/dmcrypt-get-device);\n\n- each run uses 1GB of memory and takes 1.5 seconds (on a 4GB Virtual\n Machine);\n\n- this ld.so \".dynamic\" exploit has a good chance of obtaining a\n root-shell after 2589 * 1.5 seconds ~= 1 hour. \n\n========================================================================\nIV.1.5. /bin/su\n========================================================================\n\nAs we were drafting this advisory, we discovered a general method for\ncompleting Step 1 (Clash) of the stack-clash exploitation: the Linux\nkernel limits the size of the command-line arguments and environment\nvariables to 1/4 of the RLIMIT_STACK, but it imposes this limit on the\nargument and environment strings, not on the argv[] and envp[] pointers\nto these strings (CVE-2017-1000365). \n\nOn i386, if we set RLIMIT_STACK to RLIM_INFINITY, the maximum number of\nargv[] and envp[] pointers is 1G (1/4 of the RLIMIT_STACK, divided by\n1B, the minimum size of an argument or environment string). In theory,\nthe maximum size of the initial stack is therefore 1G*(1B+4B)=5GB. In\npractice, this would exhaust the address-space and allows us to clash\nthe stack with the memory region that is mapped below, without an\napplication-specific memory leak. \n\nThis discovery allowed us to write alternative versions of our\nstack-clash exploits; for example:\n\n- an ld.so \"hwcap\" exploit against Ubuntu: we replace the LD_AUDIT\n memory leak with 2GB of stack memory (1GB of argument and environment\n strings, and 1GB of argv[] and envp[] pointers) and replace the\n LD_AUDIT library with an LD_PRELOAD library;\n\n- an ld.so \".dynamic\" exploit against systems vulnerable to offset2lib:\n we reach the end of the PIE\u0027s read-write segment with only 128MB of\n stack memory (argument and environment strings and pointers). \n\nThese proofs-of-concept demonstrate a general method for completing Step\n1 (Clash), but they are much slower than their original versions (10-20\nseconds per run) because they pass millions of argv[] and envp[]\npointers to execve(). \n\nMoreover, this discovery allowed us to exploit SUID binaries through\ngeneral methods that do not depend on application-specific or ld.so\nvulnerabilities; if a SUID binary calls setlocale(LC_ALL, \"\"); and\ngettext() (or a derivative such as strerror() or _()), then it is\nexploitable:\n\n- Step 1: we clash the stack with the heap through millions of argument\n and environment strings and pointers;\n\n- Step 2: we consume the initial stack expansion with 128KB of argument\n and environment pointers;\n\n- Step 3: we jump over the stack guard-page and into the heap with the\n alloca()tion of the LANGUAGE environment variable in gettext();\n\n- Step 4a: we smash the stack with the malloc()ation of the\n OUTPUT_CHARSET environment variable in gettext() and thus gain control\n of eip. \n\nFor example, we exploited Debian\u0027s /bin/su (from the shadow-utils): its\nmain() function calls setlocale() and save_caller_context(), which calls\ngettext() (through _()) if its stdin is not a tty. \n\nDebian 8.5\n\nDebian 8.5 is vulnerable to CVE-2016-3672: we set RLIMIT_STACK to\nRLIM_INFINITY and disable ASLR, clash the stack with the heap through\n2GB of argument and environment strings and pointers (1GB of strings,\n1GB of pointers), and return-into-libc\u0027s system() or __libc_dlopen():\n\n- the system() version uses 4GB of memory (2GB in the /bin/su process,\n and 2GB in the process fork()ed by system());\n\n- the __libc_dlopen() version uses only 2GB of memory, but ebp must\n point to our smashed data on the stack. \n\nDebian 8.6\n\nDebian 8.6 is vulnerable to offset2lib but not to CVE-2016-3672: we must\nbrute-force the libc\u0027s ASLR (8 bits of entropy), but we clash the stack\nwith the heap through only 128MB of argument and environment strings and\npointers -- this /bin/su exploit can be parallelized. \n\n========================================================================\nIV.1.6. Grsecurity/PaX\n========================================================================\n\nhttps://grsecurity.net/\n\nIn 2010, grsecurity/PaX introduced a configurable stack guard-page: its\nsize can be modified through /proc/sys/vm/heap_stack_gap and is 64KB by\ndefault (unlike the hard-coded 4KB stack guard-page in the vanilla\nkernel). \n\nUnfortunately, a 64KB stack guard-page is not large enough, and can be\njumped over with ld.so or gettext() (CVE-2017-1000377); for example, we\nwere able to gain eip control against Sudo, but we were unable to obtain\na root-shell or gain eip control against another application, because\ngrsecurity/PaX imposes the following security measures:\n\n- it restricts the RLIMIT_STACK of SUID binaries to 8MB, which prevents\n us from switching to the legacy bottom-up mmap() layout (Step 1);\n\n- it restricts the argument and environment strings to 512KB, which\n prevents us from clashing the stack through megabytes of command-line\n arguments and environment variables (Step 1);\n\n- it randomizes the PIE and libraries with 16 bits of entropy (instead\n of 8 bits in vanilla), which prevents us from brute-forcing the ASLR\n and returning-into-libc (Step 4a);\n\n- it implements /proc/sys/kernel/grsecurity/deter_bruteforce (enabled by\n default), which limits the number of SUID crashes to 1 every 15\n minutes (all Steps) and makes exploitation impossible. \n\nSudo\n\nThe vulnerability that we discovered in Sudo\u0027s get_process_ttyname()\n(CVE-2017-1000367) allows us to:\n\n- Step 1: clash the stack with 3GB of heap memory from the filesystem\n (directory pathnames) and bypass grsecurity/PaX\u0027s 512KB limit on the\n argument and environment strings;\n\n- Step 2: consume the 128KB of initial stack expansion with 3MB of\n recursive function calls and avoid grsecurity/PaX\u0027s 8MB restriction on\n the RLIMIT_STACK;\n\n- Step 3: jump over grsecurity/PaX\u0027s 64KB stack guard-page with a 128KB\n (MAX_ARG_STRLEN) alloca()tion of the LANGUAGE environment variable in\n gettext();\n\n- Step 4a: smash the stack with a 128KB (MAX_ARG_STRLEN) malloc()ation\n of the OUTPUT_CHARSET environment variable in gettext() -- the\n \"smashing-chunk\" -- and thus gain control of eip. \n\nIn Step 1, we nearly exhaust the address-space until finally malloc()\nswitches from brk() to 1MB mmap()s and reaches the start of the stack\nwith the very last 1MB mmap() that we allocate. The exact amount of\nmemory that we must allocate to reach the stack with our last 1MB mmap()\ndepends on the sum of three random variables: the 256MB randomization of\nthe stack, the 64MB randomization of the heap, and the 1MB randomization\nof the NULL region. \n\nTo maximize the probability of jumping over the stack guard-page, into\nour last 1MB mmap() below the stack, and overwriting a return-address on\nthe stack with our smashing-chunk:\n\n- (Step 1) we must allocate the mean amount of memory to reach the stack\n with our last 1MB mmap(): the sum of three uniform random variables is\n not uniform (https://en.wikipedia.org/wiki/Irwin-Hall_distribution),\n but the values within the 256MB-64MB-1MB=191MB plateau at the center\n of this bell-shaped probability distribution occur with a uniform and\n maximum probability of (1MB*64MB)/(1MB*64MB*256MB)=1/256MB;\n\n- (Step 1) the end of our last 1MB mmap() must be allocated at a\n distance within [stack guard-page (64KB), guard-page jump (128KB)]\n below the start of the stack: the guard-page jump (Step 3) then lands\n at a distance d within [0, guard-page jump - stack guard-page (64KB)]\n below the end of our last 1MB mmap();\n\n- (Step 4a) the end of our smashing-chunk must be allocated at the end\n of our last 1MB mmap(), above the landing-point of the guard-page\n jump: our smashing-chunk then overwrites a return-address on the\n stack, below the landing-point of the guard-page jump. \n\nIn theory, this probability is roughly:\n\nSUM(d = 1; d \u003c guard-page jump - stack guard-page; d++) d / (256MB*1MB)\n\n ~= ((guard-page jump - stack guard-page)^2 / 2) / (256MB*1MB)\n\n ~= 1 / 2^17\n\nIn practice, we tested this Sudo proof-of-concept on an i386 Debian 8.6\nprotected by the linux-grsec package from the jessie-backports, but we\nmanually disabled /proc/sys/kernel/grsecurity/deter_bruteforce:\n\n- it uses 3GB of memory, and 800K on-disk inodes;\n\n- it takes 5.5 seconds per run (on a 4GB Virtual Machine);\n\n- it has a good chance of gaining eip control after 2^17 * 5.5 seconds =\n 200 hours; in our test:\n\nPAX: From 192.168.56.1: execution attempt in: \u003cheap\u003e, 1b068000-a100d000 1b068000\nPAX: terminating task: /usr/bin/sudo( 1 ):25465, uid/euid: 1000/0, PC: 41414141, SP: b8844f30\nPAX: bytes at PC: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41\nPAX: bytes at SP-4: 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141 41414141\n\nHowever, brute-forcing the ASLR to obtain a root-shell would take ~1500\nyears and makes exploitation impossible. \n\nMoreover, if we enable /proc/sys/kernel/grsecurity/deter_bruteforce,\ngaining eip control would take ~1365 days, and obtaining a root-shell\nwould take thousands of years. \n\n========================================================================\nIV.1.7. 64-bit exploitation\n========================================================================\n\nIntroduction\n\nThe address-space of a 64-bit process is so vast that we initially\nthought it was impossible to clash the stack with another memory region;\nwe were wrong. \n\nLinux\u0027s execve() first randomizes the end of the mmap region (which\ngrows top-down by default) and then randomizes the end of the stack\nregion (which grows down, on x86). On amd64, the initial mmap-stack\ndistance (between the end of the mmap region and the end of the stack\nregion) is minimal when RLIMIT_STACK is lower than or equal to MIN_GAP\n(mmap_base() in arch/x86/mm/mmap.c), and then:\n\n- the end of the mmap region is equal to (as calculated by\n arch_pick_mmap_layout() in arch/x86/mm/mmap.c):\n\n mmap_end = TASK_SIZE - MIN_GAP - arch_mmap_rnd()\n\n where:\n\n . TASK_SIZE is the highest address of the user-space (0x7ffffffff000)\n\n . MIN_GAP = 128MB + stack_maxrandom_size()\n\n . stack_maxrandom_size() is ~16GB (or ~4GB if the kernel is vulnerable\n to CVE-2015-1593, but we do not consider this case here)\n\n . arch_mmap_rnd() is a random variable in the [0B,1TB] range\n\n- the end of the stack region is equal to (as calculated by\n randomize_stack_top() in fs/binfmt_elf.c):\n\n stack_end = TASK_SIZE - \"stack_rand\"\n\n where:\n\n . \"stack_rand\" is a random variable in the [0, stack_maxrandom_size()]\n range\n\n- the initial mmap-stack distance is therefore equal to:\n\n stack_end - mmap_end = MIN_GAP + arch_mmap_rnd() - \"stack_rand\"\n\n = 128MB + stack_maxrandom_size() - \"stack_rand\" + arch_mmap_rnd()\n\n = 128MB + StackRand + MmapRand\n\n where:\n\n . StackRand = stack_maxrandom_size() - \"stack_rand\", a random variable\n in the [0B,16GB] range\n\n . MmapRand = arch_mmap_rnd(), a random variable in the [0B,1TB] range\n\nConsequently, the minimum initial mmap-stack distance is only 128MB\n(CVE-2017-1000379), and:\n\n- On kernels vulnerable to offset2lib, the heap of a PIE (which is\n mapped at the end of the mmap region) is mapped below and close to the\n stack with a good probability (~1/700). We can therefore clash the\n stack with the heap in Step 1, jump over the stack guard-page and into\n the heap in Step 3, and smash the stack with the heap and gain control\n of rip in Step 4a (after 6 hours on average). However, because the\n addresses of all executable regions contain null-bytes, and because\n most of our stack-smashes in Step 4a are string operations (except the\n getaddrinfo() method), we were unable to transform such a rip control\n into arbitrary code execution. \n\n- On all kernels, either a PIE or ld.so is mapped directly below the\n stack with a good probability (~1/17000) -- the end of the PIE\u0027s or\n ld.so\u0027s read-write segment is then equal to the start of the stack\n guard-page. We can therefore adapt our ld.so \"hwcap\" exploit to amd64\n and obtain root privileges through most SUID binaries on most Linux\n distributions (after 5 hours on average). \n\nKernels vulnerable to offset2lib, local Exim proof-of-concept\n\nExim\u0027s binary is usually a PIE, mapped at the end of the mmap region;\nand the heap, which always grows up and is randomized above the end of\nthe binary, is therefore randomized above the end of the mmap region\n(arch_randomize_brk() in arch/x86/kernel/process.c):\n\n heap_start = mmap_end + \"heap_rand\"\n\nwhere \"heap_rand\" is a random variable in the [0B,32MB] range\n(negligible and ignored here). For example, on Debian 8.5:\n\n# cat /proc/\"`pidof -s /usr/sbin/exim4`\"/maps\n... \n7fa6410d6000-7fa6411c8000 r-xp 00000000 08:01 14574 /usr/sbin/exim4\n7fa6413b4000-7fa6413bd000 rw-p 00000000 00:00 0\n7fa6413c5000-7fa6413c7000 rw-p 00000000 00:00 0\n7fa6413c7000-7fa6413c9000 r--p 000f1000 08:01 14574 /usr/sbin/exim4\n7fa6413c9000-7fa6413d2000 rw-p 000f3000 08:01 14574 /usr/sbin/exim4\n7fa6413d2000-7fa6413d7000 rw-p 00000000 00:00 0\n7fa641b34000-7fa641b76000 rw-p 00000000 00:00 0 [heap]\n7ffdf3e53000-7ffdf3ed6000 rw-p 00000000 00:00 0 [stack]\n7ffdf3f3c000-7ffdf3f3e000 r-xp 00000000 00:00 0 [vdso]\n7ffdf3f3e000-7ffdf3f40000 r--p 00000000 00:00 0 [vvar]\nffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsyscall]\n\nTo reach the start of the stack with the end of the heap (through the -p\nmemory leak in Exim) in Step 1 of our stack-clash, we must minimize the\ninitial heap-stack distance, and hence the initial mmap-stack distance,\nand set RLIMIT_STACK to MIN_GAP (~16GB). This limits the size of our -p\nargument strings on the stack to 16GB/4=4GB, and because we then leak\nthe same amount of heap memory through -p, the initial heap-stack\ndistance must be:\n\n- longer than 4GB (the stack must be able to contain the -p argument\n strings);\n\n- shorter than 8GB (the end of the heap must be able to reach the start\n of the stack during the -p memory leak). \n\nThe initial heap-stack distance (approximately the initial mmap-stack\ndistance, 128MB + StackRand + MmapRand, but we ignore the 128MB term\nhere) follows a trapezoidal Irwin-Hall distribution, and the [4GB,8GB]\nrange is within the first non-uniform area of this trapezoid, so the\nprobability that the initial heap-stack distance is in this range is:\n\n SUM(d = 4GB; d \u003c 8GB; d++) d / (16GB * 1TB)\n\n = SUM(d = 0; d \u003c 4GB; d++) (4GB + d) / (16GB * 1TB)\n\n = SUM(d = 0; d \u003c 2^32; d++) (2^32 + d) / (2^34 * 2^40)\n\n ~= ((2^32)*(2^32) + (2^32)*(2^32) / 2) / (2^74)\n\n ~= 3 / 2^11\n\n ~= 1 / 682\n\nThe probability of gaining rip control after the heap reaches the stack\nis ~1/16 (as calculated by a 64-bit version of the small helper program\npresented in IV.1.1.), and the final probability of gaining rip control\nwith our local Exim proof-of-concept is:\n\n (3 / 2^11) * (1/16) ~= 1 / 10922\n\nOn our 8GB Debian 8.7 test machine, this proof-of-concept takes roughly\n2 seconds per run, and has a good chance of gaining rip control after\n10922 * 2 seconds ~= 6 hours:\n\n# gdb /usr/sbin/exim4 core.6049\nGNU gdb (Debian 7.7.1+dfsg-5) 7.7.1\n... \nThis GDB was configured as \"x86_64-linux-gnu\". \nCore was generated by `/usr/sbin/exim4 -p0000000000000000000000000000000000000000000000000000000000000\u0027. \nProgram terminated with signal SIGSEGV, Segmentation fault. \n#0 __memcpy_sse2_unaligned () at ../sysdeps/x86_64/multiarch/memcpy-sse2-unaligned.S:41\n41 ../sysdeps/x86_64/multiarch/memcpy-sse2-unaligned.S: No such file or directory. \n(gdb) x/i $rip\n=\u003e 0x7ffab1be7061 \u003c__memcpy_sse2_unaligned+65\u003e: retq\n(gdb) x/xg $rsp\n0x7ffb9b294a48: 0x4141414141414141\n\nKernels vulnerable to offset2lib, ld.so \".dynamic\" exploit\n\nSince kernels vulnerable to offset2lib map PIEs below and close to the\nstack, we tried to adapt our ld.so \".dynamic\" exploit to amd64. MIN_GAP\nguarantees a minimum distance of 128MB between the theoretical end of\nthe mmap region and the end of the stack, but the stack then grows down\nto store the argument and environment strings, and may therefore occupy\nthe theoretical end of the mmap region (where nothing has been mapped\nyet). Consequently, the end of the mmap region (where the PIE will be\nmapped) slides down to the first available address, directly below the\nstack guard-page and the initial stack expansion (described in II.3.2.):\n\n7ffbb7e51000-7ffbb7e53000 r-xp 00000000 fd:03 4465810 /tmp/test64\n... \n7ffbb8053000-7ffbb808c000 rw-p 00002000 fd:03 4465810 /tmp/test64\n7ffbb808d000-7ffc180ae000 rw-p 00000000 00:00 0 [heap]\nffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsyscall]\n\nNote: in this example, the \"[stack]\" is, again, incorrectly displayed as\nthe \"[heap]\" by show_map_vma() (in fs/proc/task_mmu.c). \n\nThis layout is ideal for our stack-clash exploits, but poses an\nunexpected problem: because the PIE is mapped directly below the stack,\nthe stack cannot grow anymore, and the only free stack space is the\ninitial stack expansion (128KB) minus the argv[] and envp[] pointers\n(which are stored there, as mentioned in II.3.2.):\n\n- on the one hand, many argv[] and envp[] pointers, and hence many\n argument and environment strings, result in a higher probability of\n mapping the PIE directly below the stack;\n\n- on the other hand, many argv[] and envp[] pointers consume most of the\n initial stack expansion and do not leave enough free stack space for\n ld.so to operate. \n\nIn practice, we pass 96KB of argv[] pointers to execve(), thus leaving\n32KB of free stack space for ld.so, and since the size of a pointer is\n8B, and the maximum size of an argument string is 128KB, we also pass\n96KB/8B*128KB=1.5GB of argument strings to execve(). The resulting\nprobability of mapping the PIE directly below the stack is:\n\n SUM(s = 0; s \u003c 1.5GB - 128MB; s++) s / (16GB * 1TB)\n\n ~= ((1.5GB - 128MB)^2 / 2) / (16GB * 1TB)\n\n ~= 1 / 17331\n\nOn a 4GB Virtual Machine, each run takes 1 second, and 17331 runs take\nroughly 5 hours. But we cannot add more uncertainty to this exploit, and\nbecause of the problems discussed in IV.1.4. (null-bytes in DT_NEEDED,\nbut also in DT_AUXILIARY on 64-bit, etc), we were unable to overwrite\nthe .dynamic section with a pattern that does not significantly decrease\nthis exploit\u0027s probability of success. \n\nAll kernels, ld.so \"hwcap\" exploit\n\nDespite this failure, we had an intuition: when the PIE is mapped\ndirectly below the stack, the stack layout should be deterministic --\nrsp should point into the 128KB of initial stack expansion, at a 32KB\noffset above the start of the stack, and the only entropy should be the\n8KB of sub-page randomization within the stack (arch_align_stack() in\narch/x86/kernel/process.c). The following output of our small test\nprogram confirmed this intuition (the fourth field is the distance\nbetween the start of the stack and our main()\u0027s rsp when the PIE is\nmapped directly below the stack):\n\n$ grep -w sp test64.out | sort -nk4\nsp 0x7ffbc271ff38 -\u003e 28472\nsp 0x7ffbb95ccff8 -\u003e 28664\nsp 0x7ffbaf062678 -\u003e 30328\nsp 0x7ffbb08736e8 -\u003e 30440\nsp 0x7ffbbc616d18 -\u003e 32024\nsp 0x7ffbc1a0fdb8 -\u003e 32184\nsp 0x7ffbb9c28ff8 -\u003e 32760\nsp 0x7ffbdbf4c178 -\u003e 33144\nsp 0x7ffbb39bc1c8 -\u003e 33224\nsp 0x7ffbebb86838 -\u003e 34872\n\nSurprisingly, the output of this test program contained additional\nvaluable information:\n\n7ffbb7e51000-7ffbb7e53000 r-xp 00000000 fd:03 4465810 /tmp/test64\n7ffbb8034000-7ffbb8037000 rw-p 00000000 00:00 0\n7ffbb804d000-7ffbb804e000 rw-p 00000000 00:00 0\n7ffbb804e000-7ffbb8050000 r--p 00000000 00:00 0 [vvar]\n7ffbb8050000-7ffbb8052000 r-xp 00000000 00:00 0 [vdso]\n7ffbb8052000-7ffbb8053000 r--p 00001000 fd:03 4465810 /tmp/test64\n7ffbb8053000-7ffbb808c000 rw-p 00002000 fd:03 4465810 /tmp/test64\n7ffbb808d000-7ffc180ae000 rw-p 00000000 00:00 0 [heap]\nffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsyscall]\n\n- the distance between the end of the read-execute segment of our test\n program and the start of its read-only and read-write segments is\n approximately 2MB; indeed, for every ELF on amd64:\n\n$ readelf -a /usr/bin/su | grep -wA1 LOAD\n LOAD 0x0000000000000000 0x0000000000000000 0x0000000000000000\n 0x00000000000061b4 0x00000000000061b4 R E 200000\n LOAD 0x0000000000006888 0x0000000000206888 0x0000000000206888\n 0x0000000000000798 0x00000000000007d0 RW 200000\n\n$ readelf -a /lib64/ld-linux-x86-64.so.2 | grep -wA1 LOAD\n LOAD 0x0000000000000000 0x0000000000000000 0x0000000000000000\n 0x000000000001fad0 0x000000000001fad0 R E 200000\n LOAD 0x000000000001fb60 0x000000000021fb60 0x000000000021fb60\n 0x000000000000141c 0x00000000000015e8 RW 200000\n\n- several objects are actually mapped inside this ~2MB hole: [vdso],\n [vvar], and two anonymous mappings (7ffbb804d000-7ffbb804e000 and\n 7ffbb8034000-7ffbb8037000). \n\nThis discovery allowed us to adapt our ld.so \"hwcap\" exploit to amd64:\n\n- we choose hardware-capabilities that are small enough to be mapped\n inside this ~2MB hole, but large enough to defeat the 8KB sub-page\n randomization of the stack;\n\n- we jump over the stack guard-page, and over the read-only and\n read-write segments of the PIE, and exploit ld.so as we did on i386. \n\nThis exploit\u0027s probability of success is therefore 1 when the PIE is\nmapped directly below the stack, and its final probability of success is\n~1/17331: it takes 1 second per run, and has a good chance of obtaining\na root-shell after 5 hours. Moreover, it works on all kernels: if a SUID\nbinary is not a PIE, or if the kernel is not vulnerable to offset2lib,\nwe simply jump over ld.so\u0027s read-write segment, instead of the PIE\u0027s. \nFor example, on Fedora 25, when the exploit succeeds and loads our own\nlibrary /var/tmp/a (the 7ffbabbef000-7ffbabca7000 mapping contains the\nhardware-capabilities that we smash):\n\n55a0c9e8d000-55a0c9e91000 r-xp 00000000 fd:00 112767 /usr/libexec/cockpit-polkit\n55a0ca091000-55a0ca093000 rw-p 00004000 fd:00 112767 /usr/libexec/cockpit-polkit\n7ffbab603000-7ffbab604000 r-xp 00000000 fd:00 4866583 /var/tmp/a\n7ffbab604000-7ffbab803000 ---p 00001000 fd:00 4866583 /var/tmp/a\n7ffbab803000-7ffbab804000 r--p 00000000 fd:00 4866583 /var/tmp/a\n7ffbab804000-7ffbaba86000 rw-p 00000000 00:00 0\n7ffbaba86000-7ffbabaab000 r-xp 00000000 fd:00 4229637 /usr/lib64/ld-2.24.so\n7ffbabbef000-7ffbabca7000 rw-p 00000000 00:00 0\n7ffbabca7000-7ffbabca9000 r--p 00000000 00:00 0 [vvar]\n7ffbabca9000-7ffbabcab000 r-xp 00000000 00:00 0 [vdso]\n7ffbabcab000-7ffbabcad000 rw-p 00025000 fd:00 4229637 /usr/lib64/ld-2.24.so\n7ffbabcad000-7ffbabcae000 rw-p 00000000 00:00 0\n7ffbabcaf000-7ffc0bcf0000 rw-p 00000000 00:00 0 [stack]\nffffffffff600000-ffffffffff601000 r-xp 00000000 00:00 0 [vsyscall]\n\n========================================================================\nIV.2. OpenBSD\n========================================================================\n\n========================================================================\nIV.2.1. Maximum RLIMIT_STACK vulnerability (CVE-2017-1000372)\n========================================================================\n\nThe OpenBSD kernel limits the maximum size of the user-space stack\n(RLIMIT_STACK) to MAXSSIZ (32MB); the execve() system-call allocates a\nMAXSSIZ memory region for the stack and divides it in two:\n\n- the second part, effectively the user-space stack, is mapped\n PROT_READ|PROT_WRITE at the end of this stack memory region, and\n occupies RLIMIT_STACK bytes (by default 8MB for root processes, and\n 4MB for user processes);\n\n- the first part, effectively a large stack guard-page, is mapped\n PROT_NONE at the start of this stack memory region, and occupies\n MAXSSIZ - RLIMIT_STACK bytes. \n\nUnfortunately, we discovered that if an attacker sets RLIMIT_STACK to\nMAXSSIZ, he eliminates the PROT_NONE part of the stack region, and hence\nthe stack guard-page itself (CVE-2017-1000372). For example:\n\n# sh -c \u0027ulimit -S -s; procmap -a -P\u0027\n8192\nStart End Size Offset rwxpc RWX I/W/A Dev Inode - File\n... \n14cf6000-14cfafff 20k 00000000 r-xp+ (rwx) 1/0/0 00:03 52375 - /usr/sbin/procmap [0xdb29ce10]\n... \n84a7b000-84a7bfff 4k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ anon ]\ncd7db000-cefdafff 24576k 00000000 ---p+ (rwx) 1/0/0 00:00 0 - [ stack ]\ncefdb000-cf7cffff 8148k 00000000 rw-p+ (rwx) 1/0/0 00:00 0 - [ stack ]\ncf7d0000-cf7dafff 44k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ stack ]\n total 10348k\n\n# sh -c \u0027ulimit -S -s `ulimit -H -s`; procmap -a -P\u0027\nStart End Size Offset rwxpc RWX I/W/A Dev Inode - File\n... \n1a47f000-1a483fff 20k 00000000 r-xp+ (rwx) 1/0/0 00:03 52375 - /usr/sbin/procmap [0xdb29ce10]\n... \n8a3c8000-8a3c9fff 8k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ anon ]\ncd7c9000-cf7bffff 32732k 00000000 rw-p+ (rwx) 1/0/0 00:00 0 - [ stack ]\ncf7c0000-cf7c8fff 36k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ stack ]\n total 33992k\n\nA remote attacker cannot exploit this vulnerability, because he cannot\nmodify RLIMIT_STACK; but a local attacker can set RLIMIT_STACK to\nMAXSSIZ, and:\n\n- Step 1: malloc()ate almost 2GB of heap memory, until the heap reaches\n the start of the stack region;\n\n- Steps 2 and 3: consume MAXSSIZ (32MB) of stack memory, until the\n stack-pointer reaches the start of the stack region (Step 2) and moves\n into the heap (Step 3);\n\n- Step 4: smash the stack with the heap (Step 4a) or smash the heap with\n the stack (Step 4b). \n\n========================================================================\nIV.2.2. Recursive qsort() vulnerability (CVE-2017-1000373)\n========================================================================\n\nTo complete Step 2, a recursive function is needed, and the first\npossibly recursive function that we investigated is qsort(). On the one\nhand, glibc\u0027s _quicksort() function (in stdlib/qsort.c) is non-recursive\n(iterative): it uses a small, specialized stack of partition structures\n(two pointers, low and high), and guarantees that no more than 32\npartitions (on i386) or 64 partitions (on amd64) are pushed onto this\nstack, because it always pushes the larger of two sub-partitions and\niterates on the smaller partition. \n\nOn the other hand, BSD\u0027s qsort() function is recursive: it always\nrecurses on the first sub-partition, and iterates on the second\nsub-partition; but instead, it should always recurse on the smaller\nsub-partition, and iterate on the larger sub-partition (CVE-2017-1000373\nin OpenBSD, CVE-2017-1000378 in NetBSD, and CVE-2017-1082 in FreeBSD). \n\nIn theory, because BSD\u0027s qsort() is not randomized, an attacker can\nconstruct a pathological input array of N elements that causes qsort()\nto deterministically recurse N times. In practice, because this qsort()\nuses the median-of-three medians-of-three selection of a pivot element\n(the \"ninther\"), our attack constructs an input array of N elements that\ncauses qsort() to recurse N/4 times. \n\n========================================================================\nIV.2.3. /usr/bin/at proof-of-concept\n========================================================================\n\n/usr/bin/at is SGID-crontab (which can be escalated to full root\nprivileges) because it must be able to create (\"at -t\"), list (\"at -l\"),\nand remove (\"at -r\") job-files in the /var/cron/atjobs directory:\n\n-r-xr-sr-x 4 root crontab 31376 Jul 26 2016 /usr/bin/at\ndrwxrwx--T 2 root crontab 512 Jul 26 2016 /var/cron/atjobs\n\nTo demonstrate that OpenBSD\u0027s RLIMIT_STACK and qsort() vulnerabilities\ncan be transformed into powerful primitives such as heap corruption, we\ndeveloped a proof-of-concept against \"at -l\" (the list_jobs() function):\n\n- Step 1 (Clash): first, list_jobs() malloc()ates an atjob structure for\n each file in /var/cron/atjobs -- if we create 40M job-files, then the\n heap reaches the stack, but we do not exhaust the address-space;\n\n- Steps 2 and 3 (Run and Jump): second, list_jobs() qsort()s the\n malloc()ated jobs -- if we construct their time-stamps with our\n qsort() attack, then we can cause qsort() to recurse 40M/4=10M times\n and consume at least 10M*4B=40MB of stack memory (each recursive call\n to qsort() consumes at least 4B, the return-address) and move the\n stack-pointer into the heap;\n\n- Step 4b (Smash the heap with the stack): last, list_jobs() free()s the\n malloc()ated jobs, and abort()s with an error message -- OpenBSD\u0027s\n hardened malloc() implementation detects that the heap has been\n corrupted by the last recursive calls to qsort(). \n\nThis naive version of our /usr/bin/at proof-of-concept poses two major\nproblems:\n\n- Our pathological input array of N=40M elements cannot be sorted (Step\n 2 never finishes because it exhibits qsort()\u0027s worst-case behavior,\n N^2). To solve this problem, we divide the input array in two:\n\n . the first, pathological part contains only n=(33MB/176B)*4=768K\n elements that are needed to complete Steps 2 and 3, and cause\n qsort() to recurse n/4 times and consume (n/4)*176B=33MB of stack\n memory (MAXSSIZ+1MB) as each recursive call to qsort() consumes 176B\n of stack memory;\n\n . the second, innocuous part contains the remaining N-n=39M elements\n that are needed to complete Step 1, but not Steps 2 and 3, and are\n therefore swapped into the second, iterative partition of the first\n recursive call to qsort(). \n\n- We were unable to create 40M files in /var/cron/atjobs: after one\n week, OpenBSD\u0027s default filesystem (ffs) had created only 4M files,\n and the rate of file creation had dropped from 25 files/second to 4\n files/second. We did not solve this problem, but nevertheless wanted\n to validate our proof-of-concept:\n\n . we transformed it into an LD_PRELOAD library that intercepts calls\n to readdir() and fstatat(), and pretends that our 40M files in\n /var/cron/atjobs exist;\n\n . we made /var/cron/atjobs world-readable and LD_PRELOADed our library\n into a non-SGID copy of /usr/bin/at;\n\n . after about an hour, \"at\" reports random heap corruptions:\n\n# chmod o+r /var/cron/atjobs\n# chmod o+r /var/cron/at.deny\n\n$ ulimit -c 0\n$ ulimit -S -d `ulimit -H -d`\n$ ulimit -S -s `ulimit -H -s`\n$ ulimit -S -a\n... \ncoredump(blocks) 0\ndata(kbytes) 3145728\nstack(kbytes) 32768\n... \n$ cp /usr/bin/at . \n\n$ LD_PRELOAD=./OpenBSD_at.so ./at -l -v -q x \u003e /dev/null\ninitializing jobkeys\nfinalizing jobkeys\nreading jobs\n10%\n20%\n30%\n40%\n50%\n60%\n70%\n80%\n90%\n100%\nsorting jobs\nat(78717) in free(): error: chunk info corrupted\nAbort trap\n\n$ LD_PRELOAD=./OpenBSD_at.so ./at -l -v -q x \u003e /dev/null\ninitializing jobkeys\nfinalizing jobkeys\nreading jobs\n10%\n20%\n30%\n40%\n50%\n60%\n70%\n80%\n90%\n100%\nsorting jobs\nat(14184) in free(): error: modified chunk-pointer 0xcd6d0120\nAbort trap\n\n========================================================================\nIV.3. NetBSD\n========================================================================\n\nLike OpenBSD, NetBSD is vulnerable to the maximum RLIMIT_STACK\nvulnerability (CVE-2017-1000374): if a local attacker sets RLIMIT_STACK\nto MAXSSIZ, he eliminates the PROT_NONE part of the stack region -- the\nstack guard-page itself. Unlike OpenBSD, however, NetBSD:\n\n- defines MAXSSIZ to 64MB on i386 (128MB on amd64);\n\n- maps the run-time link-editor ld.so directly below the stack region,\n even if ASLR is enabled (CVE-2017-1000375):\n\n$ sh -c \u0027ulimit -S -s; pmap -a -P\u0027\n2048\nStart End Size Offset rwxpc RWX I/W/A Dev Inode - File\n08048000-0804dfff 24k 00000000 r-xp+ (rwx) 1/0/0 00:00 21706 - /usr/bin/pmap [0xc5c8f0b8]\n... \nbbbee000-bbbfefff 68k 00000000 r-xp+ (rwx) 1/0/0 00:00 107525 - /libexec/ld.elf_so [0xc535f580]\nbbbff000-bbbfffff 4k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ anon ]\nbbc00000-bf9fffff 63488k 00000000 ---p+ (rwx) 1/0/0 00:00 0 - [ stack ]\nbfa00000-bfbeffff 1984k 00000000 rw-p+ (rwx) 1/0/0 00:00 0 - [ stack ]\nbfbf0000-bfbfffff 64k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ stack ]\n total 9528k\n\n$ sh -c \u0027ulimit -S -s `ulimit -H -s`; pmap -a -P\u0027\nStart End Size Offset rwxpc RWX I/W/A Dev Inode - File\n08048000-0804dfff 24k 00000000 r-xp+ (rwx) 1/0/0 00:00 21706 - /usr/bin/pmap [0xc5c8f0b8]\n... \nbbbee000-bbbfefff 68k 00000000 r-xp+ (rwx) 1/0/0 00:00 107525 - /libexec/ld.elf_so [0xc535f580]\nbbbff000-bbbfffff 4k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ anon ]\nbbc00000-bfbeffff 65472k 00000000 rw-p+ (rwx) 1/0/0 00:00 0 - [ stack ]\nbfbf0000-bfbfffff 64k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ stack ]\n total 73016k\n\n# cp /usr/bin/pmap . \n# paxctl +A ./pmap\n# sh -c \u0027ulimit -S -s `ulimit -H -s`; ./pmap -a -P\u0027\nStart End Size Offset rwxpc RWX I/W/A Dev Inode - File\n08048000-0804dfff 24k 00000000 r-xp+ (rwx) 1/0/0 00:00 172149 - /tmp/pmap [0xc5cb3c64]\n... \nbbbee000-bbbfefff 68k 00000000 r-xp+ (rwx) 1/0/0 00:00 107525 - /libexec/ld.elf_so [0xc535f580]\nbbbff000-bbbfffff 4k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ anon ]\nbbc00000-bf1bffff 55040k 00000000 rw-p+ (rwx) 1/0/0 00:00 0 - [ stack ]\nbf1c0000-bf1cefff 60k 00000000 rw-p- (rwx) 1/0/0 00:00 0 - [ stack ]\n total 62580k\n\nConsequently, a local attacker can set RLIMIT_STACK to MAXSSIZ,\neliminate the stack guard-page, and:\n\n- skip Step 1, because ld.so\u0027s read-write segment is naturally mapped\n directly below the stack region;\n\n- Steps 2 and 3: consume 64MB (MAXSSIZ) of stack memory (for example,\n through the recursive qsort() vulnerability, CVE-2017-1000378) until\n the stack-pointer reaches the start of the stack region (Step 2) and\n moves into ld.so\u0027s read-write segment (Step 3);\n\n- Step 4b: smash ld.so\u0027s read-write segment with the stack. \n\nWe did not try to exploit this vulnerability, nor did we search for a\nvulnerable SUID or SGID binary, but we wrote a simple proof-of-concept,\nand some of the following crashes may be exploitable:\n\n$ sh -c \u0027ulimit -S -s `ulimit -H -s`; ./NetBSD_CVE-2017-1000375 0x04000000\u0027\n[1] Segmentation fault ./NetBSD_CVE-201... \n\n$ sh -c \u0027ulimit -S -s `ulimit -H -s`; ./NetBSD_CVE-2017-1000375 0x03000000\u0027\n\n... \n\n$ sh -c \u0027ulimit -S -s `ulimit -H -s`; ./NetBSD_CVE-2017-1000375 0x03ec5000\u0027\n\n$ sh -c \u0027ulimit -S -s `ulimit -H -s`; ./NetBSD_CVE-2017-1000375 0x03ec5400\u0027\n[1] Segmentation fault ./NetBSD_CVE-201... \n\n$ sh -c \u0027ulimit -S -s `ulimit -H -s`; gdb ./NetBSD_CVE-2017-1000375\u0027\nGNU gdb (GDB) 7.7.1\n... \n(gdb) run 0x03ec5400\nProgram received signal SIGSEGV, Segmentation fault. \n0xbbbf448d in _rtld_symlook_default () from /usr/libexec/ld.elf_so\n(gdb) x/i $eip\n=\u003e 0xbbbf448d \u003c_rtld_symlook_default+185\u003e: mov %edx,(%esi,%edi,4)\n(gdb) info registers\nesi 0xbabae890 -1162155888\nedi 0x0 0\n... \n(gdb) run 0x03ec5800\nProgram received signal SIGSEGV, Segmentation fault. \n0xbbbf4465 in _rtld_symlook_default () from /usr/libexec/ld.elf_so\n(gdb) x/i $eip\n=\u003e 0xbbbf4465 \u003c_rtld_symlook_default+145\u003e: mov 0x4(%ecx),%edx\n(gdb) info registers\necx 0x41414141 1094795585\n... \n(gdb) run 0x03ec5c00\nProgram received signal SIGSEGV, Segmentation fault. \n0xbbbf4408 in _rtld_symlook_default () from /usr/libexec/ld.elf_so\n(gdb) x/i $eip\n=\u003e 0xbbbf4408 \u003c_rtld_symlook_default+52\u003e: mov (%eax),%esi\n(gdb) info registers\neax 0x41414141 1094795585\n... \n\n========================================================================\nIV.4. FreeBSD\n========================================================================\n\n========================================================================\nIV.4.1. setrlimit() RLIMIT_STACK vulnerability (CVE-2017-1085)\n========================================================================\n\nFreeBSD\u0027s kern_proc_setrlimit() function contains the following comment\nand code:\n\n /*\n * Stack is allocated to the max at exec time with only\n * \"rlim_cur\" bytes accessible. If stack limit is going\n * up make more accessible, if going down make inaccessible. \n */\n if (limp-\u003erlim_cur != oldssiz.rlim_cur) {\n ... \n if (limp-\u003erlim_cur \u003e oldssiz.rlim_cur) {\n prot = p-\u003ep_sysent-\u003esv_stackprot;\n size = limp-\u003erlim_cur - oldssiz.rlim_cur;\n addr = p-\u003ep_sysent-\u003esv_usrstack -\n limp-\u003erlim_cur;\n } else {\n prot = VM_PROT_NONE;\n size = oldssiz.rlim_cur - limp-\u003erlim_cur;\n addr = p-\u003ep_sysent-\u003esv_usrstack -\n oldssiz.rlim_cur;\n }\n ... \n (void)vm_map_protect(\u0026p-\u003ep_vmspace-\u003evm_map,\n addr, addr + size, prot, FALSE);\n }\n\nOpenBSD\u0027s and NetBSD\u0027s dosetrlimit() function contains the same comment,\nwhich accurately describes the layout of their user-space stack region. \nUnfortunately, FreeBSD\u0027s kern_proc_setrlimit() comment and code are\nincorrect, as hinted at in exec_new_vmspace():\n\n/*\n * Destroy old address space, and allocate a new stack\n * The new stack is only SGROWSIZ large because it is grown\n * automatically in trap.c. \n */\n\nand vm_map_stack_locked():\n\n /*\n * We initially map a stack of only init_ssize. We will grow as\n * needed later. \n\nwhere init_ssize is SGROWSIZ (128KB), not MAXSSIZ (64MB on i386),\nbecause \"init_ssize = (max_ssize \u003c growsize) ? max_ssize : growsize;\"\n(and max_ssize is MAXSSIZ, and growsize is SGROWSIZ). \n\nAs a result, if a program calls setrlimit() to increase RLIMIT_STACK,\nvm_map_protect() may turn a read-only memory region below the stack into\na read-write region (CVE-2017-1085), as demonstrated by the following\nproof-of-concept:\n\n% ./FreeBSD_CVE-2017-1085\nSegmentation fault\n\n% ./FreeBSD_CVE-2017-1085 setrlimit to the max\nchar at 0xbd155000: 41\n\n========================================================================\nIV.4.2. Stack guard-page disabled by default (CVE-2017-1083)\n========================================================================\n\nThe FreeBSD kernel implements a 4KB stack guard-page, and recent\nversions of the FreeBSD Installer offer it as a system hardening option. \nUnfortunately, it is disabled by default (CVE-2017-1083):\n\n% sysctl security.bsd.stack_guard_page\nsecurity.bsd.stack_guard_page: 0\n\n========================================================================\nIV.4.3. Stack guard-page vulnerabilities (CVE-2017-1084)\n========================================================================\n\n- If FreeBSD\u0027s stack guard-page is enabled, its entire logic is\n implemented in vm_map_growstack(): this function guarantees a minimum\n distance of 4KB (the stack guard-page) between the start of the stack\n and the end of the memory region that is mapped below (but the stack\n guard-page is not physically mapped into the address-space). \n\n Unfortunately, this guarantee is given only when the stack grows down\n and clashes with the memory region mapped below, but not if the memory\n region mapped below grows up and clashes with the stack: this\n vulnerability effectively eliminates the stack guard-page\n (CVE-2017-1084). In our proof-of-concept:\n\n . we allocate anonymous mmap()s of 4KB, until the end of an anonymous\n mmap() reaches the start of the stack [Step 1];\n\n . we call a recursive function until the stack-pointer reaches the\n start of the stack and moves into the anonymous mmap() directly\n below [Step 2];\n\n . but we do not jump over the stack guard-page, because each call to\n the recursive function allocates (and fully writes to) a 1KB\n stack-based buffer [Step 3];\n\n . and we do not crash into the stack guard-page, because CVE-2017-1084\n has effectively eliminated the stack guard-page in Step 1. \n\n# sysctl security.bsd.stack_guard_page=1\nsecurity.bsd.stack_guard_page: 0 -\u003e 1\n\n% ./FreeBSD_CVE-2017-FGPU\nchar at 0xbfbde000: 41\n\n- vm_map_growstack() implements most of the stack guard-page logic in\n the following code:\n\n /*\n * Growing downward. \n */\n /* Get the preliminary new entry start value */\n addr = stack_entry-\u003estart - grow_amount;\n\n /*\n * If this puts us into the previous entry, cut back our\n * growth to the available space. Also, see the note above. \n */\n if (addr \u003c end) {\n stack_entry-\u003eavail_ssize = max_grow;\n addr = end;\n if (stack_guard_page)\n addr += PAGE_SIZE;\n }\n\n where:\n\n . addr is the new start of the stack;\n\n . stack_entry-\u003estart is the old start of the stack;\n\n . grow_amount is the size of the stack expansion;\n\n . end is the end of the memory region below the stack. \n\n Unfortunately, the \"addr \u003c end\" test should be \"addr \u003c= end\": if addr,\n the new start of the stack, is equal to end, the end of the memory\n region mapped below, then the stack guard-page is eliminated\n (CVE-2017-1084). In our proof-of-concept:\n\n . we allocate anonymous mmap()s of 4KB, until the end of an anonymous\n mmap() reaches a randomly chosen distance below the start of the\n stack [Step 1];\n\n . we call a recursive function until the stack-pointer reaches the\n start of the stack, and the stack expansion reaches the end of the\n anonymous mmap() below [Step 2];\n\n . we do not jump over the stack guard-page, because each call to the\n recursive function allocates (and fully writes to) a 1KB stack-based\n buffer [Step 3];\n\n . and we crash into the stack guard-page most of the time;\n\n . but we survive with a probability of 4KB/128KB=1/32 (grow_amount is\n always a multiple of SGROWSIZ, 128KB) because CVE-2017-1084 has\n effectively eliminated the stack guard-page in Step 2. \n\n% sysctl security.bsd.stack_guard_page\nsecurity.bsd.stack_guard_page: 1\n\n% sh -c \u0027while true; do ./FreeBSD_CVE-2017-FGPE; done\u0027\nSegmentation fault\nchar at 0xbe45e000: 41; final dist 6097 (24778705)\nSegmentation fault\nSegmentation fault\nSegmentation fault\n... \nSegmentation fault\nSegmentation fault\nSegmentation fault\nchar at 0xbd25e000: 41; final dist 7036 (43654012)\nSegmentation fault\nSegmentation fault\nSegmentation fault\n... \nSegmentation fault\nSegmentation fault\nSegmentation fault\nchar at 0xbd29e000: 41; final dist 5331 (43390163)\nSegmentation fault\nSegmentation fault\nSegmentation fault\n... \n\n In contrast, if FreeBSD\u0027s stack guard-page is disabled, our\n proof-of-concept always survives:\n\n# sysctl security.bsd.stack_guard_page=0\nsecurity.bsd.stack_guard_page: 1 -\u003e 0\n\n% sh -c \u0027while true; do ./FreeBSD_CVE-2017-FGPE; done\u0027\nchar at 0xbe969000: 41; final dist 89894 (19488550)\nchar at 0xbfa6d000: 41; final dist 74525 (1647389)\nchar at 0xbf4df000: 41; final dist 78 (7471182)\nchar at 0xbe9e4000: 41; final dist 112397 (18986765)\nchar at 0xbf693000: 41; final dist 49811 (5685907)\nchar at 0xbf533000: 41; final dist 51037 (7128925)\nchar at 0xbd799000: 41; final dist 26043 (38167995)\nchar at 0xbd54b000: 11; final dist 83754 (40585002)\nchar at 0xbe176000: 41; final dist 36992 (27824256)\nchar at 0xbfa91000: 41; final dist 57449 (1499241)\nchar at 0xbd1b9000: 41; final dist 26115 (44328451)\nchar at 0xbd1c8000: 41; final dist 94852 (44266116)\nchar at 0xbf73a000: 41; final dist 22276 (5003012)\nchar at 0xbe6b1000: 41; final dist 58854 (22341094)\nchar at 0xbeb81000: 41; final dist 124727 (17295159)\nchar at 0xbfb35000: 41; final dist 43174 (829606)\n... \n\n- FreeBSD\u0027s thread library (libthr) mmap()s a secondary PROT_NONE stack\n guard-page at a distance RLIMIT_STACK below the end of the stack:\n\n# sysctl security.bsd.stack_guard_page=1\nsecurity.bsd.stack_guard_page: 0 -\u003e 1\n\n% sh -c \u0027exec procstat -v $$\u0027\n PID START END PRT RES PRES REF SHD FLAG TP PATH\n 2779 0x8048000 0x8050000 r-x 8 8 1 0 CN-- vn /usr/bin/procstat\n... \n 2779 0x28400000 0x28800000 rw- 22 35 2 0 ---- df\n 2779 0xbfbdf000 0xbfbff000 rwx 3 3 1 0 ---D df\n 2779 0xbfbff000 0xbfc00000 r-x 1 1 23 0 ---- ph\n\n% sh -c \u0027LD_PRELOAD=libthr.so exec procstat -v $$\u0027\n PID START END PRT RES PRES REF SHD FLAG TP PATH\n 2798 0x8048000 0x8050000 r-x 8 8 1 0 CN-- vn /usr/bin/procstat\n... \n 2798 0x28400000 0x28800000 rw- 23 35 2 0 ---- df\n 2798 0xbbbfe000 0xbbbff000 --- 0 0 0 0 ---- --\n 2798 0xbfbdf000 0xbfbff000 rwx 3 3 1 0 ---D df\n 2798 0xbfbff000 0xbfc00000 r-x 1 1 23 0 ---- ph\n\n Unfortunately, this secondary stack guard-page does not mitigate the\n vulnerabilities that we discovered in FreeBSD\u0027s stack guard-page\n implementation:\n\n% sysctl security.bsd.stack_guard_page\nsecurity.bsd.stack_guard_page: 1\n\n% sh -c \u0027LD_PRELOAD=libthr.so ./FreeBSD_CVE-2017-FGPU\u0027\nchar at 0xbfbde000: 41\n\n% sh -c \u0027while true; do LD_PRELOAD=libthr.so ./FreeBSD_CVE-2017-FGPE; done\u0027\nSegmentation fault\nSegmentation fault\nSegmentation fault\n... \nSegmentation fault\nSegmentation fault\nSegmentation fault\nchar at 0xbda5e000: 41; final dist 3839 (35262207)\nSegmentation fault\nSegmentation fault\nSegmentation fault\n... \nSegmentation fault\nSegmentation fault\nSegmentation fault\nchar at 0xbdb1e000: 41; final dist 3549 (34475485)\nSegmentation fault\nSegmentation fault\nSegmentation fault\n... \n\n========================================================================\nIV.4.4. Remote exploitation\n========================================================================\n\nBecause FreeBSD\u0027s stack guard-page is disabled by default, we tried (and\nfailed) to remotely exploit a test service vulnerable to:\n\n- an unlimited memory leak that allows us to malloc()ate gigabytes of\n memory;\n\n- a limited recursion that allows us to allocate up to 1MB of stack\n memory. \n\nFreeBSD\u0027s malloc() implementation (jemalloc) mmap()s 4MB chunks of\nanonymous memory that are aligned on multiples of 4MB. The first 4MB\nmmap() chunk starts at 0x28400000, and the last 4MB mmap() chunk ends at\n0xbf800000, because the stack itself already ends at 0xbfc00000; but it\nis impossible to cover this final mmap-stack distance (almost 4MB) with\nthe limited recursion (1MB) of our test service. \nbreak(0x80499b0) = 0 (0x0)\nbreak(0x8400000) = 0 (0x0)\nmmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = 672845824 (0x281ad000)\nmmap(0x285ad000,2437120,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = 677040128 (0x285ad000)\nmunmap(0x281ad000,2437120) = 0 (0x0)\nmmap(0x0,8388608,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = 679477248 (0x28800000)\nmunmap(0x28c00000,4194304) = 0 (0x0)\nmmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = 683671552 (0x28c00000)\nmmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = 687865856 (0x29000000)\nmmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = 692060160 (0x29400000)\nmmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = 696254464 (0x29800000)\nmmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = 700448768 (0x29c00000)\n... \nmmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = -1103101952 (0xbe400000)\nmmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = -1098907648 (0xbe800000)\nmmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = -1094713344 (0xbec00000)\nmmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = -1090519040 (0xbf000000)\nmmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) = -1086324736 (0xbf400000)\nmmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) ERR#12 \u0027Cannot allocate memory\u0027\nbreak(0x8800000) = 0 (0x0)\nmmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) ERR#12 \u0027Cannot allocate memory\u0027\nbreak(0x8c00000) = 0 (0x0)\nmmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) ERR#12 \u0027Cannot allocate memory\u0027\nbreak(0x9000000) = 0 (0x0)\n... \nmmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) ERR#12 \u0027Cannot allocate memory\u0027\nbreak(0x27c00000) = 0 (0x0)\nmmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) ERR#12 \u0027Cannot allocate memory\u0027\nbreak(0x28000000) = 0 (0x0)\nmmap(0x0,4194304,PROT_READ|PROT_WRITE,MAP_PRIVATE|MAP_ANON,-1,0x0) ERR#12 \u0027Cannot allocate memory\u0027\nbreak(0x28400000) ERR#12 \u0027Cannot allocate memory\u0027\n\n========================================================================\nIV.5. Solaris \u003e= 11.1\n========================================================================\n\n========================================================================\nIV.5.1. Minimal RLIMIT_STACK vulnerability (CVE-2017-3630)\n========================================================================\n\nOn Solaris, ASLR can be enabled or disabled for each ELF binary with the\nSUNW_ASLR dynamic section entry (man elfedit):\n\n$ elfdump /usr/bin/rsh | egrep \u0027ASLR|NX\u0027\n [39] SUNW_ASLR 0x2 ENABLE\n [40] SUNW_NXHEAP 0x2 ENABLE\n [41] SUNW_NXSTACK 0x2 ENABLE\n\nWithout ASLR\n\nIf ASLR is disabled:\n\n- a stack region of size RLIMIT_STACK is reserved in the address-space;\n\n- a 4KB stack guard-page is mapped directly below this stack region;\n\n- the runtime linker ld.so is mapped directly below this stack\n guard-page. \n\n$ cp /usr/bin/sleep . \n$ chmod u+w ./sleep\n$ elfedit -e \u0027dyn:sunw_aslr disable\u0027 ./sleep\n\n$ sh -c \u0027ulimit -S -s; ./sleep 3 \u0026 pmap -r ${!}\u0027\n8192\n7176: ./sleep 3\n... \nFE7B1000 228K r-x---- /lib/ld.so.1\nFE7FA000 8K rwx---- /lib/ld.so.1\nFE7FC000 8K rwx---- /lib/ld.so.1\nFE7FF000 8192K rw----- [ stack ]\n total 17148K\n\n$ sh -c \u0027ulimit -S -s 64; ./sleep 3 \u0026 pmap -r ${!}\u0027\n7244: ./sleep 3\n... \nFEFA1000 228K r-x---- /lib/ld.so.1\nFEFEA000 8K rwx---- /lib/ld.so.1\nFEFEC000 8K rwx---- /lib/ld.so.1\nFEFEF000 64K rw----- [ stack ]\n total 9020K\n\nOn the one hand, a local attacker can exploit this simplified\nstack-clash:\n\n- Step 1 (Clash) is not needed, because ld.so is naturally mapped\n directly below the stack (the distance between the end of ld.so\u0027s\n read-write segment and the start of the stack is 4KB, the stack\n guard-page);\n\n- Step 2 (Run) is not needed, because a local attacker can set\n RLIMIT_STACK to just a few kilobytes, reserve a very small stack\n region, and hence shorten the distance between the stack-pointer and\n the start of the stack (and the end of ld.so\u0027s read-write segment);\n\n- Step 3 (Jump) can be completed with a large stack-based buffer that is\n not fully written to;\n\n- Step 4b (Smash) can be completed by overwriting the function pointers\n in ld.so\u0027s read-write segment with the contents of a stack-based\n buffer. \n\nSuch a simplified stack-clash exploit was first mentioned in Gael\nDelalleau\u0027s 2005 presentation (slide 30). \n\nOn the other hand, a remote attacker cannot modify RLIMIT_STACK and must\ncomplete Step 2 (Run) with a recursive function that consumes the 8MB\n(the default RLIMIT_STACK) between the stack-pointer and the start of\nthe stack. \n\nWith ASLR\n\nIf ASLR is enabled:\n\n- a stack region of size RLIMIT_STACK is reserved in the address-space;\n\n- a 4KB stack guard-page is mapped directly below this stack region;\n\n- the runtime linker ld.so is mapped below this stack guard-page, but at\n a random distance (within a [4KB,128MB] range) -- effectively a large,\n secondary stack guard-page. \n\nOn the one hand, a local attacker can run the simplified \"Without ASLR\"\nstack-clash exploit until the ld.so-stack distance is minimal -- with a\nprobability of 4KB/128MB=1/32K, the distance between the end of ld.so\u0027s\nread-write segment and the start of the stack is exactly 8KB: the stack\nguard-page plus the minimum distance between the stack guard-page and\nld.so (CVE-2017-3629). \n\nOn the other hand, a remote attacker must complete Step 2 (Run) with a\nrecursive function, and:\n\n- has a good chance of exploiting this stack-clash after 32K connections\n (when the ld.so-stack distance is minimal) if the remote service\n re-execve()s (re-randomizes the ld.so-stack distance for each new\n connection);\n\n- cannot exploit this stack-clash if the remote service does not\n re-execve() (does not re-randomize the ld.so-stack distance for each\n new connection) unless the attacker is able to restart the service,\n reboot the server, or target a 32K-server farm. \n\n========================================================================\nIV.5.2. /usr/bin/rsh exploit\n========================================================================\n\n/usr/bin/rsh is SUID-root and its main() function allocates a 50KB\nstack-based buffer that is not written to and can be used to jump over\nthe stack guard-page, into ld.so\u0027s read-write segment, in Step 3 of our\nsimplified stack-clash exploit. \n\nNext, we discovered a general method for gaining eip control in Step 4b:\nsetlocale(LC_ALL, \"\"), called by the main() function of /usr/bin/rsh and\nother SUID binaries, copies the LC_ALL environment variable to several\nstack-based buffers and thus smashes ld.so\u0027s read-write segment and\noverwrites some of ld.so\u0027s function pointers. \n\nLast, we execute our own shell-code: we return-into-binary (/usr/bin/rsh\nis not a PIE), to an instruction that reliably jumps into a copy of our\nLC_ALL environment variable in ld.so\u0027s read-write segment, which is in\nfact read-write-executable. For example, after we gain control of eip:\n\n- on Solaris 11.1, we return to a \"pop; pop; ret\" instruction, because a\n pointer to our shell-code is stored at an 8-byte offset from esp;\n\n- on Solaris 11.3, we return to a \"call *0xc(%ebp)\" instruction, because\n a pointer to our shell-code is stored at a 12-byte offset from ebp. \n\nOur Solaris exploit brute-forces the random ld.so-stack distance and two\nparameters:\n\n- the RLIMIT_STACK;\n\n- the length of the LC_ALL environment variable. \n\n========================================================================\nIV.5.3. Forced-Privilege vulnerability (CVE-2017-3631)\n========================================================================\n\n/usr/bin/rsh is SUID-root, but the shell that we obtained in Step 4b of\nour stack-clash exploit did not grant us full root privileges, only\nnet_privaddr, the privilege to bind to a privileged port number. \nDisappointed by this result, we investigated and found:\n\n$ ggrep -r /usr/bin/rsh /etc 2\u003e/dev/null\n/etc/security/exec_attr.d/core-os:Forced Privilege:solaris:cmd:RO::/usr/bin/rsh:privs=net_privaddr\n\n$ /usr/bin/rsh -h\n/usr/bin/rsh: illegal option -- h\nusage: rsh [ -PN / -PO ] [ -l login ] [ -n ] [ -k realm ] [ -a ] [ -x ] [ -f / -F ] host command\n rsh [ -PN / -PO ] [ -l login ] [ -k realm ] [ -a ] [ -x ] [ -f / -F ] host\n\n# cat truss.out\n... \n7319: execve(\"/usr/bin/rsh\", 0xA9479C548, 0xA94792808) argc = 2\n7319: *** FPRIV: P/E: net_privaddr ***\n... \n\nUnfortunately, this Forced-Privilege protection is based on the pathname\nof SUID-root binaries, which can be execve()d through hard-links, under\ndifferent pathnames (CVE-2017-3631). For example, we discovered that\nreadable SUID-root binaries can be execve()d through hard-links in\n/proc:\n\n$ sleep 3 \u003c /usr/bin/rsh \u0026 /proc/${!}/fd/0 -h\n[1] 7333\n/proc/7333/fd/0: illegal option -- h\nusage: rsh [ -PN / -PO ] [ -l login ] [ -n ] [ -k realm ] [ -a ] [ -x ] [ -f / -F ] host command\n rsh [ -PN / -PO ] [ -l login ] [ -k realm ] [ -a ] [ -x ] [ -f / -F ] host\n\n# cat truss.out\n... \n7335: execve(\"/proc/7333/fd/0\", 0xA947CA508, 0xA94792808) argc = 2\n7335: *** SUID: ruid/euid/suid = 100 / 0 / 0 ***\n... \n\nThis vulnerability allows us to bypass the Forced-Privilege protection\nand obtain full root privileges with our /usr/bin/rsh exploit. \n\n\n========================================================================\nV. Acknowledgments\n========================================================================\n\nWe thank the members of the distros list, Oracle/Solaris, Exim, Sudo,\nsecurity@kernel.org, grsecurity/PaX, and OpenBSD. Description:\n\nRed Hat Container Development Kit is a platform for developing\ncontainerized applicationsaaait is a set of tools that enables developers\nto quickly and easily set up an environment for developing and testing\ncontainerized applications on the Red Hat Enterprise Linux platform. An attacker could use this flaw to crash a server\napplication compiled against the NSS library. Solution:\n\nThe References section of this erratum contains a link to download CDK\n3.0.0-2 (you must log in to download the update). \n==========================================================================\nUbuntu Security Notice USN-3323-2\nJune 29, 2017\n\neglibc vulnerability\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 ESM\n\nSummary:\n\nGnu C library could be made to run programs as an administrator. \n\nSoftware Description:\n- eglibc: GNU C Library\n\nDetails:\n\nUSN-3323-1 fixed a vulnerability in the GNU C Library. This update provides the\ncorresponding update for Ubuntu 12.04 ESM. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 ESM:\n libc6 2.15-0ubuntu10.20\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-1000366"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005209"
},
{
"db": "BID",
"id": "99127"
},
{
"db": "VULHUB",
"id": "VHN-100094"
},
{
"db": "VULMON",
"id": "CVE-2017-1000366"
},
{
"db": "PACKETSTORM",
"id": "142990"
},
{
"db": "PACKETSTORM",
"id": "142999"
},
{
"db": "PACKETSTORM",
"id": "142992"
},
{
"db": "PACKETSTORM",
"id": "143016"
},
{
"db": "PACKETSTORM",
"id": "143096"
},
{
"db": "PACKETSTORM",
"id": "143196"
}
],
"trust": 2.61
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=42276",
"trust": 0.3,
"type": "exploit"
},
{
"reference": "https://www.scap.org.cn/vuln/vhn-100094",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-100094"
},
{
"db": "VULMON",
"id": "CVE-2017-1000366"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-1000366",
"trust": 3.5
},
{
"db": "BID",
"id": "99127",
"trust": 2.1
},
{
"db": "MCAFEE",
"id": "SB10205",
"trust": 2.1
},
{
"db": "EXPLOIT-DB",
"id": "42274",
"trust": 1.8
},
{
"db": "EXPLOIT-DB",
"id": "42276",
"trust": 1.8
},
{
"db": "EXPLOIT-DB",
"id": "42275",
"trust": 1.8
},
{
"db": "PACKETSTORM",
"id": "154361",
"trust": 1.8
},
{
"db": "SECTRACK",
"id": "1038712",
"trust": 1.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005209",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201706-808",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2019.3313",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "142990",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "142992",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "142999",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "143196",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "143205",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "143001",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "143207",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "143005",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "143201",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "143225",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-100094",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2017-1000366",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "143016",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "143096",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-100094"
},
{
"db": "VULMON",
"id": "CVE-2017-1000366"
},
{
"db": "BID",
"id": "99127"
},
{
"db": "PACKETSTORM",
"id": "142990"
},
{
"db": "PACKETSTORM",
"id": "142999"
},
{
"db": "PACKETSTORM",
"id": "142992"
},
{
"db": "PACKETSTORM",
"id": "143016"
},
{
"db": "PACKETSTORM",
"id": "143096"
},
{
"db": "PACKETSTORM",
"id": "143196"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-808"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005209"
},
{
"db": "NVD",
"id": "CVE-2017-1000366"
}
]
},
"id": "VAR-201706-0334",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-100094"
}
],
"trust": 0.01
},
"last_update_date": "2025-12-22T22:38:08.762000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "CVE-2017-1000366",
"trust": 0.8,
"url": "https://access.redhat.com/security/cve/CVE-2017-1000366"
},
{
"title": "CVE-2017-1000366",
"trust": 0.8,
"url": "https://www.suse.com/security/cve/CVE-2017-1000366/"
},
{
"title": "SUSE products and a new security bug class referred to as \"Stack Clash\".",
"trust": 0.8,
"url": "https://www.suse.com/support/kb/doc/?id=7020973"
},
{
"title": "glibc Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=71084"
},
{
"title": "Red Hat: Important: glibc security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20171480 - Security Advisory"
},
{
"title": "Red Hat: Important: glibc security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20171481 - Security Advisory"
},
{
"title": "Red Hat: Important: glibc security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20171479 - Security Advisory"
},
{
"title": "Red Hat: Important: Red Hat Container Development Kit 3.0.0 security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20171567 - Security Advisory"
},
{
"title": "Ubuntu Security Notice: eglibc, glibc vulnerability",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3323-1"
},
{
"title": "Ubuntu Security Notice: eglibc vulnerability",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3323-2"
},
{
"title": "Debian Security Advisories: DSA-3887-1 glibc -- security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=09de7cf27f70b4503f183a914f8b80ac"
},
{
"title": "Red Hat: Important: Red Hat 3scale API Management Platform 2.0.0 security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20171712 - Security Advisory"
},
{
"title": "Amazon Linux AMI: ALAS-2017-844",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2017-844"
},
{
"title": "Arch Linux Advisories: [ASA-201706-22] lib32-glibc: privilege escalation",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201706-22"
},
{
"title": "Arch Linux Advisories: [ASA-201706-23] glibc: privilege escalation",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201706-23"
},
{
"title": "Red Hat: CVE-2017-1000366",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2017-1000366"
},
{
"title": "Arch Linux Issues: ",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2017-1000366"
},
{
"title": "Red Hat: Moderate: glibc security, bug fix, and enhancement update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180805 - Security Advisory"
},
{
"title": "Brocade Security Advisories: BSA-2017-355",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=brocade_security_advisories\u0026qid=ceec973689010b3f9fce9a7f3e1542a1"
},
{
"title": "Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - July 2017",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins\u0026qid=f1373f5dee274fec5bdcbc4c7e701395"
},
{
"title": "IBM: IBM Security Bulletin: Vyatta 5600 vRouter Software Patches \u2013 Release 1801-za",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=8710e4e233940f7482a6adad4643a7a8"
},
{
"title": "Oracle Linux Bulletins: Oracle Linux Bulletin - July 2017",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=549dc795290b298746065b62b4bb7928"
},
{
"title": "ansible-everyday",
"trust": 0.1,
"url": "https://github.com/kaosagnt/ansible-everyday "
},
{
"title": "Exp101tsArchiv30thers",
"trust": 0.1,
"url": "https://github.com/nu11secur1ty/Exp101tsArchiv30thers "
},
{
"title": "awesome-cve-poc_qazbnm456",
"trust": 0.1,
"url": "https://github.com/xbl3/awesome-cve-poc_qazbnm456 "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2017-1000366"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-808"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005209"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-100094"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005209"
},
{
"db": "NVD",
"id": "CVE-2017-1000366"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "http://www.securityfocus.com/bid/99127"
},
{
"trust": 2.4,
"url": "http://www.debian.org/security/2017/dsa-3887"
},
{
"trust": 2.4,
"url": "http://packetstormsecurity.com/files/154361/cisco-device-hardcoded-credentials-gnu-glibc-busybox.html"
},
{
"trust": 2.3,
"url": "https://access.redhat.com/security/cve/cve-2017-1000366"
},
{
"trust": 2.2,
"url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
},
{
"trust": 1.9,
"url": "https://www.exploit-db.com/exploits/42276/"
},
{
"trust": 1.9,
"url": "https://access.redhat.com/errata/rhsa-2017:1479"
},
{
"trust": 1.9,
"url": "https://access.redhat.com/errata/rhsa-2017:1480"
},
{
"trust": 1.9,
"url": "https://access.redhat.com/errata/rhsa-2017:1567"
},
{
"trust": 1.8,
"url": "https://seclists.org/bugtraq/2019/sep/7"
},
{
"trust": 1.8,
"url": "https://www.suse.com/security/cve/cve-2017-1000366/"
},
{
"trust": 1.8,
"url": "https://www.suse.com/support/kb/doc/?id=7020973"
},
{
"trust": 1.8,
"url": "https://www.exploit-db.com/exploits/42274/"
},
{
"trust": 1.8,
"url": "https://www.exploit-db.com/exploits/42275/"
},
{
"trust": 1.8,
"url": "http://seclists.org/fulldisclosure/2019/sep/7"
},
{
"trust": 1.8,
"url": "https://security.gentoo.org/glsa/201706-19"
},
{
"trust": 1.8,
"url": "https://access.redhat.com/errata/rhsa-2017:1481"
},
{
"trust": 1.8,
"url": "https://access.redhat.com/errata/rhsa-2017:1712"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id/1038712"
},
{
"trust": 1.7,
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10205"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000366"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-1000366"
},
{
"trust": 0.6,
"url": "https://www.ibm.com/support/docview.wss?uid=ibm10960426"
},
{
"trust": 0.6,
"url": "https://www.ibm.com/support/docview.wss?uid=ibm10887793"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2019.3313/"
},
{
"trust": 0.6,
"url": "https://www-01.ibm.com/support/docview.wss?uid=ibm10960426"
},
{
"trust": 0.3,
"url": "https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=efa26d9c13a6fabd34a05139e1d8b2e441b2fae9"
},
{
"trust": 0.3,
"url": "http://www.gnu.org/software/libc/"
},
{
"trust": 0.3,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1452543"
},
{
"trust": 0.3,
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=cve-2017-1000366"
},
{
"trust": 0.3,
"url": "https://www.oracle.com/technetwork/topics/security/linuxbulletinjul2017-3832368.html"
},
{
"trust": 0.3,
"url": "https://www.oracle.com/technetwork/topics/security/ovmbulletinjul2017-3832369.html"
},
{
"trust": 0.3,
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10205\u0026actp=null\u0026viewlocale=en_us\u0026showdraft=false\u0026platinum_status=false\u0026locale=en_us"
},
{
"trust": 0.2,
"url": "https://www.ubuntu.com/usn/usn-3323-1"
},
{
"trust": 0.2,
"url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
},
{
"trust": 0.2,
"url": "https://bugzilla.redhat.com/):"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/team/contact/"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"trust": 0.1,
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026amp;id=sb10205"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/119.html"
},
{
"trust": 0.1,
"url": "https://usn.ubuntu.com/3323-1/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://tools.cisco.com/security/center/viewalert.x?alertid=54249"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/glibc/2.24-3ubuntu2.2"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/glibc/2.23-0ubuntu9"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/eglibc/2.19-0ubuntu6.13"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/glibc/2.24-9ubuntu2.2"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/vulnerabilities/stackguard"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/team/key/"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/articles/11258"
},
{
"trust": 0.1,
"url": "https://www.debian.org/security/"
},
{
"trust": 0.1,
"url": "https://www.debian.org/security/faq"
},
{
"trust": 0.1,
"url": "https://googleprojectzero.blogspot.com/2016/06/exploiting-recursion-in-linux-kernel_20.html"
},
{
"trust": 0.1,
"url": "https://grsecurity.net/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000370"
},
{
"trust": 0.1,
"url": "http://cansecwest.com/core05/memory_vulns_delalleau.pdf"
},
{
"trust": 0.1,
"url": "https://cybersecurity.upv.es/attacks/offset2lib/offset2lib.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000373"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000371"
},
{
"trust": 0.1,
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1fd836dcf00d2028c700c7e44d2c23404062c90"
},
{
"trust": 0.1,
"url": "https://en.wikipedia.org/wiki/irwin-hall_distribution),"
},
{
"trust": 0.1,
"url": "https://grsecurity.net/features.php);"
},
{
"trust": 0.1,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2010-2240"
},
{
"trust": 0.1,
"url": "https://jon.oberheide.org/files/infiltrate12-thestackisback.pdf"
},
{
"trust": 0.1,
"url": "http://phrack.org/issues/63/14.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-2240"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000365"
},
{
"trust": 0.1,
"url": "http://www.gnu.org/software/cflow/);"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000376"
},
{
"trust": 0.1,
"url": "http://blog.exodusintel.com/2013/01/07/who-was-phone/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-3672"
},
{
"trust": 0.1,
"url": "https://jon.oberheide.org/blog/2010/11/29/exploiting-stack-overflows-in-the-linux-kernel/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000369"
},
{
"trust": 0.1,
"url": "http://www.invisiblethingslab.com/resources/misc-2010/xorg-large-memory-attacks.pdf"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-1083"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000372"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-1082"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000364"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7502"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2017-1000364"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2017-7502"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/downloads/content/293/"
},
{
"trust": 0.1,
"url": "https://www.ubuntu.com/usn/usn-3323-2"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-100094"
},
{
"db": "VULMON",
"id": "CVE-2017-1000366"
},
{
"db": "BID",
"id": "99127"
},
{
"db": "PACKETSTORM",
"id": "142990"
},
{
"db": "PACKETSTORM",
"id": "142999"
},
{
"db": "PACKETSTORM",
"id": "142992"
},
{
"db": "PACKETSTORM",
"id": "143016"
},
{
"db": "PACKETSTORM",
"id": "143096"
},
{
"db": "PACKETSTORM",
"id": "143196"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-808"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005209"
},
{
"db": "NVD",
"id": "CVE-2017-1000366"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-100094"
},
{
"db": "VULMON",
"id": "CVE-2017-1000366"
},
{
"db": "BID",
"id": "99127"
},
{
"db": "PACKETSTORM",
"id": "142990"
},
{
"db": "PACKETSTORM",
"id": "142999"
},
{
"db": "PACKETSTORM",
"id": "142992"
},
{
"db": "PACKETSTORM",
"id": "143016"
},
{
"db": "PACKETSTORM",
"id": "143096"
},
{
"db": "PACKETSTORM",
"id": "143196"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-808"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005209"
},
{
"db": "NVD",
"id": "CVE-2017-1000366"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-06-19T00:00:00",
"db": "VULHUB",
"id": "VHN-100094"
},
{
"date": "2017-06-19T00:00:00",
"db": "VULMON",
"id": "CVE-2017-1000366"
},
{
"date": "2017-06-19T00:00:00",
"db": "BID",
"id": "99127"
},
{
"date": "2017-06-19T23:52:57",
"db": "PACKETSTORM",
"id": "142990"
},
{
"date": "2017-06-19T23:54:30",
"db": "PACKETSTORM",
"id": "142999"
},
{
"date": "2017-06-19T23:53:10",
"db": "PACKETSTORM",
"id": "142992"
},
{
"date": "2017-06-20T00:36:06",
"db": "PACKETSTORM",
"id": "143016"
},
{
"date": "2017-06-21T22:27:41",
"db": "PACKETSTORM",
"id": "143096"
},
{
"date": "2017-06-30T06:41:55",
"db": "PACKETSTORM",
"id": "143196"
},
{
"date": "2017-06-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201706-808"
},
{
"date": "2017-07-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-005209"
},
{
"date": "2017-06-19T16:29:00.310000",
"db": "NVD",
"id": "CVE-2017-1000366"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-10-15T00:00:00",
"db": "VULHUB",
"id": "VHN-100094"
},
{
"date": "2020-10-15T00:00:00",
"db": "VULMON",
"id": "CVE-2017-1000366"
},
{
"date": "2017-09-05T20:13:00",
"db": "BID",
"id": "99127"
},
{
"date": "2019-09-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201706-808"
},
{
"date": "2017-07-21T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-005209"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2017-1000366"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "99127"
},
{
"db": "PACKETSTORM",
"id": "142990"
},
{
"db": "PACKETSTORM",
"id": "142992"
},
{
"db": "PACKETSTORM",
"id": "143196"
},
{
"db": "CNNVD",
"id": "CNNVD-201706-808"
}
],
"trust": 1.2
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "glibc Buffer error vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-005209"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201706-808"
}
],
"trust": 0.6
}
}
GSD-2017-1000366
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2017-1000366",
"description": "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.",
"id": "GSD-2017-1000366",
"references": [
"https://www.suse.com/security/cve/CVE-2017-1000366.html",
"https://www.debian.org/security/2017/dsa-3887",
"https://access.redhat.com/errata/RHSA-2017:1567",
"https://access.redhat.com/errata/RHSA-2017:1481",
"https://access.redhat.com/errata/RHSA-2017:1480",
"https://access.redhat.com/errata/RHSA-2017:1479",
"https://ubuntu.com/security/CVE-2017-1000366",
"https://advisories.mageia.org/CVE-2017-1000366.html",
"https://security.archlinux.org/CVE-2017-1000366",
"https://alas.aws.amazon.com/cve/html/CVE-2017-1000366.html",
"https://linux.oracle.com/cve/CVE-2017-1000366.html",
"https://packetstormsecurity.com/files/cve/CVE-2017-1000366"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-1000366"
],
"details": "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.",
"id": "GSD-2017-1000366",
"modified": "2023-12-13T01:21:02.392389Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-1000366",
"REQUESTER": "qsa@qualys.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt",
"refsource": "MISC",
"url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
},
{
"name": "1038712",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038712"
},
{
"name": "42275",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42275/"
},
{
"name": "RHSA-2017:1712",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1712"
},
{
"name": "https://www.suse.com/security/cve/CVE-2017-1000366/",
"refsource": "CONFIRM",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366/"
},
{
"name": "RHSA-2017:1479",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1479"
},
{
"name": "RHSA-2017:1480",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1480"
},
{
"name": "99127",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99127"
},
{
"name": "42276",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42276/"
},
{
"name": "https://www.suse.com/support/kb/doc/?id=7020973",
"refsource": "CONFIRM",
"url": "https://www.suse.com/support/kb/doc/?id=7020973"
},
{
"name": "RHSA-2017:1567",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1567"
},
{
"name": "42274",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42274/"
},
{
"name": "https://access.redhat.com/security/cve/CVE-2017-1000366",
"refsource": "CONFIRM",
"url": "https://access.redhat.com/security/cve/CVE-2017-1000366"
},
{
"name": "RHSA-2017:1481",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:1481"
},
{
"name": "DSA-3887",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2017/dsa-3887"
},
{
"name": "GLSA-201706-19",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201706-19"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10205",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10205"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2019/Sep/7"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/Sep/7"
},
{
"name": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:5:*:server:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_long_life:5.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:ltss:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server_for_raspberry_pi:12:sp2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12.0:sp2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_for_sap:12:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:openstack:cloud_magnum_orchestration:7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_point_of_sale:11.0:sp3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:ltss:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.25",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "7.6.2.14",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "7.7.2.2",
"versionStartIncluding": "7.7.0.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-1000366"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.suse.com/support/kb/doc/?id=7020973",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://www.suse.com/support/kb/doc/?id=7020973"
},
{
"name": "https://www.suse.com/security/cve/CVE-2017-1000366/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://www.suse.com/security/cve/CVE-2017-1000366/"
},
{
"name": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt",
"refsource": "MISC",
"tags": [
"Technical Description",
"Third Party Advisory"
],
"url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
},
{
"name": "https://access.redhat.com/security/cve/CVE-2017-1000366",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2017-1000366"
},
{
"name": "99127",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/99127"
},
{
"name": "GLSA-201706-19",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201706-19"
},
{
"name": "1038712",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1038712"
},
{
"name": "42276",
"refsource": "EXPLOIT-DB",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/42276/"
},
{
"name": "42275",
"refsource": "EXPLOIT-DB",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/42275/"
},
{
"name": "42274",
"refsource": "EXPLOIT-DB",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/42274/"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10205",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10205"
},
{
"name": "DSA-3887",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2017/dsa-3887"
},
{
"name": "RHSA-2017:1712",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1712"
},
{
"name": "RHSA-2017:1567",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1567"
},
{
"name": "RHSA-2017:1481",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1481"
},
{
"name": "RHSA-2017:1480",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1480"
},
{
"name": "RHSA-2017:1479",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1479"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"refsource": "FULLDISC",
"tags": [],
"url": "http://seclists.org/fulldisclosure/2019/Sep/7"
},
{
"name": "20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X",
"refsource": "BUGTRAQ",
"tags": [],
"url": "https://seclists.org/bugtraq/2019/Sep/7"
},
{
"name": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html",
"refsource": "MISC",
"tags": [],
"url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2020-10-15T13:28Z",
"publishedDate": "2017-06-19T16:29Z"
}
}
}
FKIE_CVE-2017-1000366
Vulnerability from fkie_nvd - Published: 2017-06-19 16:29 - Updated: 2025-04-20 01:37| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html | ||
| cve@mitre.org | http://seclists.org/fulldisclosure/2019/Sep/7 | ||
| cve@mitre.org | http://www.debian.org/security/2017/dsa-3887 | Third Party Advisory | |
| cve@mitre.org | http://www.securityfocus.com/bid/99127 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.securitytracker.com/id/1038712 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | https://access.redhat.com/errata/RHSA-2017:1479 | Third Party Advisory | |
| cve@mitre.org | https://access.redhat.com/errata/RHSA-2017:1480 | Third Party Advisory | |
| cve@mitre.org | https://access.redhat.com/errata/RHSA-2017:1481 | Third Party Advisory | |
| cve@mitre.org | https://access.redhat.com/errata/RHSA-2017:1567 | Third Party Advisory | |
| cve@mitre.org | https://access.redhat.com/errata/RHSA-2017:1712 | Third Party Advisory | |
| cve@mitre.org | https://access.redhat.com/security/cve/CVE-2017-1000366 | Third Party Advisory | |
| cve@mitre.org | https://kc.mcafee.com/corporate/index?page=content&id=SB10205 | Patch, Third Party Advisory | |
| cve@mitre.org | https://seclists.org/bugtraq/2019/Sep/7 | ||
| cve@mitre.org | https://security.gentoo.org/glsa/201706-19 | Third Party Advisory | |
| cve@mitre.org | https://www.exploit-db.com/exploits/42274/ | Third Party Advisory, VDB Entry | |
| cve@mitre.org | https://www.exploit-db.com/exploits/42275/ | Third Party Advisory, VDB Entry | |
| cve@mitre.org | https://www.exploit-db.com/exploits/42276/ | Third Party Advisory, VDB Entry | |
| cve@mitre.org | https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt | Technical Description, Third Party Advisory | |
| cve@mitre.org | https://www.suse.com/security/cve/CVE-2017-1000366/ | Third Party Advisory | |
| cve@mitre.org | https://www.suse.com/support/kb/doc/?id=7020973 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2019/Sep/7 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2017/dsa-3887 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/99127 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038712 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:1479 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:1480 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:1481 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:1567 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:1712 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2017-1000366 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10205 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Sep/7 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201706-19 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/42274/ | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/42275/ | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/42276/ | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt | Technical Description, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.suse.com/security/cve/CVE-2017-1000366/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.suse.com/support/kb/doc/?id=7020973 | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| redhat | enterprise_linux | 5 | |
| redhat | enterprise_linux | 6.0 | |
| redhat | enterprise_linux | 7.0 | |
| redhat | enterprise_linux_desktop | 6.0 | |
| redhat | enterprise_linux_desktop | 7.0 | |
| redhat | enterprise_linux_server | 6.0 | |
| redhat | enterprise_linux_server | 6.6 | |
| redhat | enterprise_linux_server | 7.0 | |
| redhat | enterprise_linux_server_aus | 5.9 | |
| redhat | enterprise_linux_server_aus | 6.2 | |
| redhat | enterprise_linux_server_aus | 6.4 | |
| redhat | enterprise_linux_server_aus | 6.5 | |
| redhat | enterprise_linux_server_aus | 6.6 | |
| redhat | enterprise_linux_server_aus | 7.2 | |
| redhat | enterprise_linux_server_aus | 7.3 | |
| redhat | enterprise_linux_server_aus | 7.4 | |
| redhat | enterprise_linux_server_aus | 7.6 | |
| redhat | enterprise_linux_server_eus | 6.2 | |
| redhat | enterprise_linux_server_eus | 6.5 | |
| redhat | enterprise_linux_server_eus | 6.7 | |
| redhat | enterprise_linux_server_eus | 7.2 | |
| redhat | enterprise_linux_server_eus | 7.3 | |
| redhat | enterprise_linux_server_eus | 7.4 | |
| redhat | enterprise_linux_server_eus | 7.5 | |
| redhat | enterprise_linux_server_eus | 7.6 | |
| redhat | enterprise_linux_server_long_life | 5.9 | |
| redhat | enterprise_linux_server_tus | 6.5 | |
| redhat | enterprise_linux_server_tus | 6.6 | |
| redhat | enterprise_linux_server_tus | 7.2 | |
| redhat | enterprise_linux_server_tus | 7.3 | |
| redhat | enterprise_linux_server_tus | 7.6 | |
| redhat | enterprise_linux_workstation | 6.0 | |
| redhat | enterprise_linux_workstation | 7.0 | |
| openstack | cloud_magnum_orchestration | 7 | |
| novell | suse_linux_enterprise_desktop | 12.0 | |
| novell | suse_linux_enterprise_point_of_sale | 11.0 | |
| novell | suse_linux_enterprise_server | 11.0 | |
| opensuse | leap | 42.2 | |
| suse | linux_enterprise_for_sap | 12 | |
| suse | linux_enterprise_server | 10 | |
| suse | linux_enterprise_server | 11 | |
| suse | linux_enterprise_server | 12 | |
| suse | linux_enterprise_server | 12 | |
| suse | linux_enterprise_server | 12 | |
| suse | linux_enterprise_server_for_raspberry_pi | 12 | |
| suse | linux_enterprise_software_development_kit | 11.0 | |
| suse | linux_enterprise_software_development_kit | 12.0 | |
| gnu | glibc | * | |
| debian | debian_linux | 8.0 | |
| debian | debian_linux | 9.0 | |
| mcafee | web_gateway | * | |
| mcafee | web_gateway | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:5:*:server:*:*:*:*:*",
"matchCriteriaId": "5833A489-D6DE-4D51-9E74-189CBC2E28CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A62C9FF6-525F-4706-908C-1081B51AA464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "92C9F1C4-55B0-426D-BB5E-01372C23AF97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6D0378-F0F4-4AAA-80AF-8287C790EC96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "16E6D998-B41D-4B49-9E00-8336D2E40A4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1C8D871B-AEA1-4407-AEE3-47EC782250FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C462C17E-DEB3-4E28-9D3E-FEE97907EC14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "45010D45-2FF2-4B04-B115-6B6FE606D598",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6C81647C-9A53-481D-A54C-36770A093F90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "44B067C7-735E-43C9-9188-7E1522A02491",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8442C20-41F9-47FD-9A12-E724D3A31FD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_long_life:5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B0CC2D9E-C769-4810-99DD-540614627FFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "835AE071-CEAE-49E5-8F0C-E5F50FB85EFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "13E02156-E748-4820-B76F-7074793837E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6755B6AD-0422-467B-8115-34A60B1D1A40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openstack:cloud_magnum_orchestration:7:*:*:*:*:*:*:*",
"matchCriteriaId": "B27A3E24-7BC2-4EA9-BFAD-987C2CDEF8DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp2:*:*:*:*:*:*",
"matchCriteriaId": "4A24B121-952E-44CD-92CB-3D66E00DD38F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:novell:suse_linux_enterprise_point_of_sale:11.0:sp3:*:*:*:*:*:*",
"matchCriteriaId": "51E07D0D-67A6-4DDE-BE4E-959DE0A3314F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:ltss:*:*:*",
"matchCriteriaId": "3F8CE3BD-993B-407F-BAEC-A070F6B46E6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1EA337A3-B9A3-4962-B8BD-8E0C7C5B28EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_for_sap:12:sp1:*:*:*:*:*:*",
"matchCriteriaId": "E901D2F9-B4EA-420A-B1DA-4CD5B0A021CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*",
"matchCriteriaId": "35BBD83D-BDC7-4678-BE94-639F59281139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*",
"matchCriteriaId": "55C5561F-BE86-4EEA-99D4-8697F8BD9DFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:ltss:*:*:*",
"matchCriteriaId": "0651347C-AE16-4155-98EF-A0A2C63A37A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:*:*:*:*",
"matchCriteriaId": "F84B2729-7B52-4505-9656-1BD31B980705",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:sp2:*:*:ltss:*:*:*",
"matchCriteriaId": "32C12523-2500-44D0-97EE-E740BD3E61B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server_for_raspberry_pi:12:sp2:*:*:*:*:*:*",
"matchCriteriaId": "4605D055-EA6E-4C90-9277-AC067E1BD02D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*",
"matchCriteriaId": "51FA1B64-D002-41CC-908F-3798122ACD25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12.0:sp2:*:*:*:*:*:*",
"matchCriteriaId": "484E3B41-F560-47A7-9C4C-C0DAF3510818",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9C3B907D-79AF-44AC-BD23-C369CD6AE173",
"versionEndIncluding": "2.25",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D6AE5831-D666-4D79-9B37-87A969F9127D",
"versionEndIncluding": "7.6.2.14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "27C7DAE9-3B9A-4062-BB77-683318A739F6",
"versionEndIncluding": "7.7.2.2",
"versionStartIncluding": "7.7.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier."
},
{
"lang": "es",
"value": "Glibc contiene una vulnerabilidad que permite que los valores LD_LIBRARY_PATH especialmente creados para manipular la regi\u00f3n heap/stack de la memoria, generando entonces un alias, lo que podr\u00eda conllevar a la ejecuci\u00f3n del c\u00f3digo arbitrario. Tenga en cuenta que se han realizado cambios de refuerzo adicionales en glibc para evitar la manipulaci\u00f3n del stack y heap de la memoria de almacenamiento din\u00e1mico, pero estos problemas no se pueden explotar directamente, por lo que no se les ha otorgado un CVE. Esto impacta a glibc versi\u00f3n 2.25 y anteriores."
}
],
"id": "CVE-2017-1000366",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-06-19T16:29:00.310",
"references": [
{
"source": "cve@mitre.org",
"url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"
},
{
"source": "cve@mitre.org",
"url": "http://seclists.org/fulldisclosure/2019/Sep/7"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2017/dsa-3887"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/99127"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1038712"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1479"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1480"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1481"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1567"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1712"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2017-1000366"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10205"
},
{
"source": "cve@mitre.org",
"url": "https://seclists.org/bugtraq/2019/Sep/7"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201706-19"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/42274/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/42275/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/42276/"
},
{
"source": "cve@mitre.org",
"tags": [
"Technical Description",
"Third Party Advisory"
],
"url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.suse.com/security/cve/CVE-2017-1000366/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.suse.com/support/kb/doc/?id=7020973"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2019/Sep/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2017/dsa-3887"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/99127"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1038712"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1479"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1480"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1481"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1567"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2017:1712"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2017-1000366"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10205"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://seclists.org/bugtraq/2019/Sep/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201706-19"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/42274/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/42275/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/42276/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Technical Description",
"Third Party Advisory"
],
"url": "https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.suse.com/security/cve/CVE-2017-1000366/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.suse.com/support/kb/doc/?id=7020973"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
OPENSUSE-SU-2024:10792-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "glibc-2.34-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the glibc-2.34-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10792",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10792-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-5064 page",
"url": "https://www.suse.com/security/cve/CVE-2009-5064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-5155 page",
"url": "https://www.suse.com/security/cve/CVE-2009-5155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-3192 page",
"url": "https://www.suse.com/security/cve/CVE-2010-3192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5180 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10228 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10228/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10739 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6261 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6323 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6323/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000366 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000408 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000408/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12132 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12132/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-12133 page",
"url": "https://www.suse.com/security/cve/CVE-2017-12133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15670 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15670/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-16997 page",
"url": "https://www.suse.com/security/cve/CVE-2017-16997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17426 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17426/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18269 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18269/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-1000001 page",
"url": "https://www.suse.com/security/cve/CVE-2018-1000001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-11236 page",
"url": "https://www.suse.com/security/cve/CVE-2018-11236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-11237 page",
"url": "https://www.suse.com/security/cve/CVE-2018-11237/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19591 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19591/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6485 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6485/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19126 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-25013 page",
"url": "https://www.suse.com/security/cve/CVE-2019-25013/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-7309 page",
"url": "https://www.suse.com/security/cve/CVE-2019-7309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9169 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10029 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10029/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1752 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27618 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29562 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29562/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29573 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29573/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6096 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6096/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27645 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27645/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3326 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3326/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33574 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33574/"
}
],
"title": "glibc-2.34-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10792-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.34-1.2.aarch64",
"product": {
"name": "glibc-2.34-1.2.aarch64",
"product_id": "glibc-2.34-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.34-1.2.aarch64",
"product": {
"name": "glibc-devel-2.34-1.2.aarch64",
"product_id": "glibc-devel-2.34-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-devel-static-2.34-1.2.aarch64",
"product": {
"name": "glibc-devel-static-2.34-1.2.aarch64",
"product_id": "glibc-devel-static-2.34-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-extra-2.34-1.2.aarch64",
"product": {
"name": "glibc-extra-2.34-1.2.aarch64",
"product_id": "glibc-extra-2.34-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-html-2.34-1.2.aarch64",
"product": {
"name": "glibc-html-2.34-1.2.aarch64",
"product_id": "glibc-html-2.34-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-i18ndata-2.34-1.2.aarch64",
"product": {
"name": "glibc-i18ndata-2.34-1.2.aarch64",
"product_id": "glibc-i18ndata-2.34-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-info-2.34-1.2.aarch64",
"product": {
"name": "glibc-info-2.34-1.2.aarch64",
"product_id": "glibc-info-2.34-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-lang-2.34-1.2.aarch64",
"product": {
"name": "glibc-lang-2.34-1.2.aarch64",
"product_id": "glibc-lang-2.34-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.34-1.2.aarch64",
"product": {
"name": "glibc-locale-2.34-1.2.aarch64",
"product_id": "glibc-locale-2.34-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-locale-base-2.34-1.2.aarch64",
"product": {
"name": "glibc-locale-base-2.34-1.2.aarch64",
"product_id": "glibc-locale-base-2.34-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "glibc-profile-2.34-1.2.aarch64",
"product": {
"name": "glibc-profile-2.34-1.2.aarch64",
"product_id": "glibc-profile-2.34-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "nscd-2.34-1.2.aarch64",
"product": {
"name": "nscd-2.34-1.2.aarch64",
"product_id": "nscd-2.34-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.34-1.2.ppc64le",
"product": {
"name": "glibc-2.34-1.2.ppc64le",
"product_id": "glibc-2.34-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.34-1.2.ppc64le",
"product": {
"name": "glibc-devel-2.34-1.2.ppc64le",
"product_id": "glibc-devel-2.34-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-devel-static-2.34-1.2.ppc64le",
"product": {
"name": "glibc-devel-static-2.34-1.2.ppc64le",
"product_id": "glibc-devel-static-2.34-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-extra-2.34-1.2.ppc64le",
"product": {
"name": "glibc-extra-2.34-1.2.ppc64le",
"product_id": "glibc-extra-2.34-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-html-2.34-1.2.ppc64le",
"product": {
"name": "glibc-html-2.34-1.2.ppc64le",
"product_id": "glibc-html-2.34-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-i18ndata-2.34-1.2.ppc64le",
"product": {
"name": "glibc-i18ndata-2.34-1.2.ppc64le",
"product_id": "glibc-i18ndata-2.34-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-info-2.34-1.2.ppc64le",
"product": {
"name": "glibc-info-2.34-1.2.ppc64le",
"product_id": "glibc-info-2.34-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-lang-2.34-1.2.ppc64le",
"product": {
"name": "glibc-lang-2.34-1.2.ppc64le",
"product_id": "glibc-lang-2.34-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.34-1.2.ppc64le",
"product": {
"name": "glibc-locale-2.34-1.2.ppc64le",
"product_id": "glibc-locale-2.34-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-locale-base-2.34-1.2.ppc64le",
"product": {
"name": "glibc-locale-base-2.34-1.2.ppc64le",
"product_id": "glibc-locale-base-2.34-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "glibc-profile-2.34-1.2.ppc64le",
"product": {
"name": "glibc-profile-2.34-1.2.ppc64le",
"product_id": "glibc-profile-2.34-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "nscd-2.34-1.2.ppc64le",
"product": {
"name": "nscd-2.34-1.2.ppc64le",
"product_id": "nscd-2.34-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.34-1.2.s390x",
"product": {
"name": "glibc-2.34-1.2.s390x",
"product_id": "glibc-2.34-1.2.s390x"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.34-1.2.s390x",
"product": {
"name": "glibc-devel-2.34-1.2.s390x",
"product_id": "glibc-devel-2.34-1.2.s390x"
}
},
{
"category": "product_version",
"name": "glibc-devel-static-2.34-1.2.s390x",
"product": {
"name": "glibc-devel-static-2.34-1.2.s390x",
"product_id": "glibc-devel-static-2.34-1.2.s390x"
}
},
{
"category": "product_version",
"name": "glibc-extra-2.34-1.2.s390x",
"product": {
"name": "glibc-extra-2.34-1.2.s390x",
"product_id": "glibc-extra-2.34-1.2.s390x"
}
},
{
"category": "product_version",
"name": "glibc-html-2.34-1.2.s390x",
"product": {
"name": "glibc-html-2.34-1.2.s390x",
"product_id": "glibc-html-2.34-1.2.s390x"
}
},
{
"category": "product_version",
"name": "glibc-i18ndata-2.34-1.2.s390x",
"product": {
"name": "glibc-i18ndata-2.34-1.2.s390x",
"product_id": "glibc-i18ndata-2.34-1.2.s390x"
}
},
{
"category": "product_version",
"name": "glibc-info-2.34-1.2.s390x",
"product": {
"name": "glibc-info-2.34-1.2.s390x",
"product_id": "glibc-info-2.34-1.2.s390x"
}
},
{
"category": "product_version",
"name": "glibc-lang-2.34-1.2.s390x",
"product": {
"name": "glibc-lang-2.34-1.2.s390x",
"product_id": "glibc-lang-2.34-1.2.s390x"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.34-1.2.s390x",
"product": {
"name": "glibc-locale-2.34-1.2.s390x",
"product_id": "glibc-locale-2.34-1.2.s390x"
}
},
{
"category": "product_version",
"name": "glibc-locale-base-2.34-1.2.s390x",
"product": {
"name": "glibc-locale-base-2.34-1.2.s390x",
"product_id": "glibc-locale-base-2.34-1.2.s390x"
}
},
{
"category": "product_version",
"name": "glibc-profile-2.34-1.2.s390x",
"product": {
"name": "glibc-profile-2.34-1.2.s390x",
"product_id": "glibc-profile-2.34-1.2.s390x"
}
},
{
"category": "product_version",
"name": "nscd-2.34-1.2.s390x",
"product": {
"name": "nscd-2.34-1.2.s390x",
"product_id": "nscd-2.34-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glibc-2.34-1.2.x86_64",
"product": {
"name": "glibc-2.34-1.2.x86_64",
"product_id": "glibc-2.34-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-devel-2.34-1.2.x86_64",
"product": {
"name": "glibc-devel-2.34-1.2.x86_64",
"product_id": "glibc-devel-2.34-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-devel-static-2.34-1.2.x86_64",
"product": {
"name": "glibc-devel-static-2.34-1.2.x86_64",
"product_id": "glibc-devel-static-2.34-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-extra-2.34-1.2.x86_64",
"product": {
"name": "glibc-extra-2.34-1.2.x86_64",
"product_id": "glibc-extra-2.34-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-html-2.34-1.2.x86_64",
"product": {
"name": "glibc-html-2.34-1.2.x86_64",
"product_id": "glibc-html-2.34-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-i18ndata-2.34-1.2.x86_64",
"product": {
"name": "glibc-i18ndata-2.34-1.2.x86_64",
"product_id": "glibc-i18ndata-2.34-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-info-2.34-1.2.x86_64",
"product": {
"name": "glibc-info-2.34-1.2.x86_64",
"product_id": "glibc-info-2.34-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-lang-2.34-1.2.x86_64",
"product": {
"name": "glibc-lang-2.34-1.2.x86_64",
"product_id": "glibc-lang-2.34-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-locale-2.34-1.2.x86_64",
"product": {
"name": "glibc-locale-2.34-1.2.x86_64",
"product_id": "glibc-locale-2.34-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-locale-base-2.34-1.2.x86_64",
"product": {
"name": "glibc-locale-base-2.34-1.2.x86_64",
"product_id": "glibc-locale-base-2.34-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "glibc-profile-2.34-1.2.x86_64",
"product": {
"name": "glibc-profile-2.34-1.2.x86_64",
"product_id": "glibc-profile-2.34-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "nscd-2.34-1.2.x86_64",
"product": {
"name": "nscd-2.34-1.2.x86_64",
"product_id": "nscd-2.34-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.34-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-2.34-1.2.aarch64"
},
"product_reference": "glibc-2.34-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.34-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le"
},
"product_reference": "glibc-2.34-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.34-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-2.34-1.2.s390x"
},
"product_reference": "glibc-2.34-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-2.34-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-2.34-1.2.x86_64"
},
"product_reference": "glibc-2.34-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.34-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64"
},
"product_reference": "glibc-devel-2.34-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.34-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le"
},
"product_reference": "glibc-devel-2.34-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.34-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x"
},
"product_reference": "glibc-devel-2.34-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-2.34-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64"
},
"product_reference": "glibc-devel-2.34-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-static-2.34-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64"
},
"product_reference": "glibc-devel-static-2.34-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-static-2.34-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le"
},
"product_reference": "glibc-devel-static-2.34-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-static-2.34-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x"
},
"product_reference": "glibc-devel-static-2.34-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-devel-static-2.34-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64"
},
"product_reference": "glibc-devel-static-2.34-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-extra-2.34-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64"
},
"product_reference": "glibc-extra-2.34-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-extra-2.34-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le"
},
"product_reference": "glibc-extra-2.34-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-extra-2.34-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x"
},
"product_reference": "glibc-extra-2.34-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-extra-2.34-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64"
},
"product_reference": "glibc-extra-2.34-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.34-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64"
},
"product_reference": "glibc-html-2.34-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.34-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le"
},
"product_reference": "glibc-html-2.34-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.34-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x"
},
"product_reference": "glibc-html-2.34-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-html-2.34-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64"
},
"product_reference": "glibc-html-2.34-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.34-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64"
},
"product_reference": "glibc-i18ndata-2.34-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.34-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le"
},
"product_reference": "glibc-i18ndata-2.34-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.34-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x"
},
"product_reference": "glibc-i18ndata-2.34-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-i18ndata-2.34-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64"
},
"product_reference": "glibc-i18ndata-2.34-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.34-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64"
},
"product_reference": "glibc-info-2.34-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.34-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le"
},
"product_reference": "glibc-info-2.34-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.34-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x"
},
"product_reference": "glibc-info-2.34-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-info-2.34-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64"
},
"product_reference": "glibc-info-2.34-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-lang-2.34-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64"
},
"product_reference": "glibc-lang-2.34-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-lang-2.34-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le"
},
"product_reference": "glibc-lang-2.34-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-lang-2.34-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x"
},
"product_reference": "glibc-lang-2.34-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-lang-2.34-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64"
},
"product_reference": "glibc-lang-2.34-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.34-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64"
},
"product_reference": "glibc-locale-2.34-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.34-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le"
},
"product_reference": "glibc-locale-2.34-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.34-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x"
},
"product_reference": "glibc-locale-2.34-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-2.34-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64"
},
"product_reference": "glibc-locale-2.34-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-base-2.34-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64"
},
"product_reference": "glibc-locale-base-2.34-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-base-2.34-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le"
},
"product_reference": "glibc-locale-base-2.34-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-base-2.34-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x"
},
"product_reference": "glibc-locale-base-2.34-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-locale-base-2.34-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64"
},
"product_reference": "glibc-locale-base-2.34-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.34-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64"
},
"product_reference": "glibc-profile-2.34-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.34-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le"
},
"product_reference": "glibc-profile-2.34-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.34-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x"
},
"product_reference": "glibc-profile-2.34-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glibc-profile-2.34-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64"
},
"product_reference": "glibc-profile-2.34-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.34-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nscd-2.34-1.2.aarch64"
},
"product_reference": "nscd-2.34-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.34-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le"
},
"product_reference": "nscd-2.34-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.34-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nscd-2.34-1.2.s390x"
},
"product_reference": "nscd-2.34-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nscd-2.34-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
},
"product_reference": "nscd-2.34-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-5064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-5064"
}
],
"notes": [
{
"category": "general",
"text": "ldd in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows local users to gain privileges via a Trojan horse executable file linked with a modified loader that omits certain LD_TRACE_LOADED_OBJECTS checks. NOTE: the GNU C Library vendor states \"This is just nonsense. There are a gazillion other ways to introduce code if people are downloading arbitrary binaries and install them in appropriate directories or set LD_LIBRARY_PATH etc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-5064",
"url": "https://www.suse.com/security/cve/CVE-2009-5064"
},
{
"category": "external",
"summary": "SUSE Bug 677787 for CVE-2009-5064",
"url": "https://bugzilla.suse.com/677787"
},
{
"category": "external",
"summary": "SUSE Bug 684385 for CVE-2009-5064",
"url": "https://bugzilla.suse.com/684385"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-5064"
},
{
"cve": "CVE-2009-5155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-5155"
}
],
"notes": [
{
"category": "general",
"text": "In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-5155",
"url": "https://www.suse.com/security/cve/CVE-2009-5155"
},
{
"category": "external",
"summary": "SUSE Bug 1127223 for CVE-2009-5155",
"url": "https://bugzilla.suse.com/1127223"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-5155"
},
{
"cve": "CVE-2010-3192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-3192"
}
],
"notes": [
{
"category": "general",
"text": "Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by a setuid program that contains a stack-based buffer overflow error, related to the __fortify_fail function in debug/fortify_fail.c, and the __stack_chk_fail (aka stack protection) and __chk_fail (aka FORTIFY_SOURCE) implementations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-3192",
"url": "https://www.suse.com/security/cve/CVE-2010-3192"
},
{
"category": "external",
"summary": "SUSE Bug 636113 for CVE-2010-3192",
"url": "https://bugzilla.suse.com/636113"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-3192"
},
{
"cve": "CVE-2015-5180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5180"
}
],
"notes": [
{
"category": "general",
"text": "res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5180",
"url": "https://www.suse.com/security/cve/CVE-2015-5180"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2015-5180",
"url": "https://bugzilla.suse.com/1123874"
},
{
"category": "external",
"summary": "SUSE Bug 1215582 for CVE-2015-5180",
"url": "https://bugzilla.suse.com/1215582"
},
{
"category": "external",
"summary": "SUSE Bug 941234 for CVE-2015-5180",
"url": "https://bugzilla.suse.com/941234"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-5180"
},
{
"cve": "CVE-2016-10228",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10228"
}
],
"notes": [
{
"category": "general",
"text": "The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10228",
"url": "https://www.suse.com/security/cve/CVE-2016-10228"
},
{
"category": "external",
"summary": "SUSE Bug 1027496 for CVE-2016-10228",
"url": "https://bugzilla.suse.com/1027496"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2016-10228",
"url": "https://bugzilla.suse.com/1123874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-10228"
},
{
"cve": "CVE-2016-10739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10739"
}
],
"notes": [
{
"category": "general",
"text": "In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10739",
"url": "https://www.suse.com/security/cve/CVE-2016-10739"
},
{
"category": "external",
"summary": "SUSE Bug 1122729 for CVE-2016-10739",
"url": "https://bugzilla.suse.com/1122729"
},
{
"category": "external",
"summary": "SUSE Bug 1155094 for CVE-2016-10739",
"url": "https://bugzilla.suse.com/1155094"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-10739"
},
{
"cve": "CVE-2016-6261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6261"
}
],
"notes": [
{
"category": "general",
"text": "The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6261",
"url": "https://www.suse.com/security/cve/CVE-2016-6261"
},
{
"category": "external",
"summary": "SUSE Bug 1118435 for CVE-2016-6261",
"url": "https://bugzilla.suse.com/1118435"
},
{
"category": "external",
"summary": "SUSE Bug 1173590 for CVE-2016-6261",
"url": "https://bugzilla.suse.com/1173590"
},
{
"category": "external",
"summary": "SUSE Bug 990190 for CVE-2016-6261",
"url": "https://bugzilla.suse.com/990190"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-6261"
},
{
"cve": "CVE-2016-6323",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6323"
}
],
"notes": [
{
"category": "general",
"text": "The makecontext function in the GNU C Library (aka glibc or libc6) before 2.25 creates execution contexts incompatible with the unwinder on ARM EABI (32-bit) platforms, which might allow context-dependent attackers to cause a denial of service (hang), as demonstrated by applications compiled using gccgo, related to backtrace generation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6323",
"url": "https://www.suse.com/security/cve/CVE-2016-6323"
},
{
"category": "external",
"summary": "SUSE Bug 994359 for CVE-2016-6323",
"url": "https://bugzilla.suse.com/994359"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-6323"
},
{
"cve": "CVE-2017-1000366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000366"
}
],
"notes": [
{
"category": "general",
"text": "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000366",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366"
},
{
"category": "external",
"summary": "SUSE Bug 1037551 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1037551"
},
{
"category": "external",
"summary": "SUSE Bug 1039357 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1039357"
},
{
"category": "external",
"summary": "SUSE Bug 1063847 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1063847"
},
{
"category": "external",
"summary": "SUSE Bug 1071319 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1071319"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1123874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-1000366"
},
{
"cve": "CVE-2017-1000408",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000408"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in glibc 2.1.1 (released on May 24, 1999) can be reached and amplified through the LD_HWCAP_MASK environment variable. Please note that many versions of glibc are not vulnerable to this issue if patched for CVE-2017-1000366.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000408",
"url": "https://www.suse.com/security/cve/CVE-2017-1000408"
},
{
"category": "external",
"summary": "SUSE Bug 1039357 for CVE-2017-1000408",
"url": "https://bugzilla.suse.com/1039357"
},
{
"category": "external",
"summary": "SUSE Bug 1071319 for CVE-2017-1000408",
"url": "https://bugzilla.suse.com/1071319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-1000408"
},
{
"cve": "CVE-2017-12132",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12132"
}
],
"notes": [
{
"category": "general",
"text": "The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12132",
"url": "https://www.suse.com/security/cve/CVE-2017-12132"
},
{
"category": "external",
"summary": "SUSE Bug 1051791 for CVE-2017-12132",
"url": "https://bugzilla.suse.com/1051791"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2017-12132",
"url": "https://bugzilla.suse.com/1123874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-12132"
},
{
"cve": "CVE-2017-12133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-12133"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) before 2.26 allows remote attackers to have unspecified impact via vectors related to error path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-12133",
"url": "https://www.suse.com/security/cve/CVE-2017-12133"
},
{
"category": "external",
"summary": "SUSE Bug 1081556 for CVE-2017-12133",
"url": "https://bugzilla.suse.com/1081556"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2017-12133",
"url": "https://bugzilla.suse.com/1123874"
},
{
"category": "external",
"summary": "SUSE Bug 980854 for CVE-2017-12133",
"url": "https://bugzilla.suse.com/980854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-12133"
},
{
"cve": "CVE-2017-15670",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15670"
}
],
"notes": [
{
"category": "general",
"text": "The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow in the glob function in glob.c, related to the processing of home directories using the ~ operator followed by a long string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15670",
"url": "https://www.suse.com/security/cve/CVE-2017-15670"
},
{
"category": "external",
"summary": "SUSE Bug 1064583 for CVE-2017-15670",
"url": "https://bugzilla.suse.com/1064583"
},
{
"category": "external",
"summary": "SUSE Bug 1110160 for CVE-2017-15670",
"url": "https://bugzilla.suse.com/1110160"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2017-15670",
"url": "https://bugzilla.suse.com/1123874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-15670"
},
{
"cve": "CVE-2017-16997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-16997"
}
],
"notes": [
{
"category": "general",
"text": "elf/dl-load.c in the GNU C Library (aka glibc or libc6) 2.19 through 2.26 mishandles RPATH and RUNPATH containing $ORIGIN for a privileged (setuid or AT_SECURE) program, which allows local users to gain privileges via a Trojan horse library in the current working directory, related to the fillin_rpath and decompose_rpath functions. This is associated with misinterpretion of an empty RPATH/RUNPATH token as the \"./\" directory. NOTE: this configuration of RPATH/RUNPATH for a privileged program is apparently very uncommon; most likely, no such program is shipped with any common Linux distribution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-16997",
"url": "https://www.suse.com/security/cve/CVE-2017-16997"
},
{
"category": "external",
"summary": "SUSE Bug 1073231 for CVE-2017-16997",
"url": "https://bugzilla.suse.com/1073231"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-16997"
},
{
"cve": "CVE-2017-17426",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17426"
}
],
"notes": [
{
"category": "general",
"text": "The malloc function in the GNU C Library (aka glibc or libc6) 2.26 could return a memory block that is too small if an attempt is made to allocate an object whose size is close to SIZE_MAX, potentially leading to a subsequent heap overflow. This occurs because the per-thread cache (aka tcache) feature enables a code path that lacks an integer overflow check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17426",
"url": "https://www.suse.com/security/cve/CVE-2017-17426"
},
{
"category": "external",
"summary": "SUSE Bug 1071479 for CVE-2017-17426",
"url": "https://bugzilla.suse.com/1071479"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-17426"
},
{
"cve": "CVE-2017-18269",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18269"
}
],
"notes": [
{
"category": "general",
"text": "An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address space, resulting in corrupt data being produced by the copy operation. This may disclose information to context-dependent attackers, or result in a denial of service, or, possibly, code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18269",
"url": "https://www.suse.com/security/cve/CVE-2017-18269"
},
{
"category": "external",
"summary": "SUSE Bug 1094150 for CVE-2017-18269",
"url": "https://bugzilla.suse.com/1094150"
},
{
"category": "external",
"summary": "SUSE Bug 1118435 for CVE-2017-18269",
"url": "https://bugzilla.suse.com/1118435"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-18269"
},
{
"cve": "CVE-2018-1000001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-1000001"
}
],
"notes": [
{
"category": "general",
"text": "In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-1000001",
"url": "https://www.suse.com/security/cve/CVE-2018-1000001"
},
{
"category": "external",
"summary": "SUSE Bug 1074293 for CVE-2018-1000001",
"url": "https://bugzilla.suse.com/1074293"
},
{
"category": "external",
"summary": "SUSE Bug 1099047 for CVE-2018-1000001",
"url": "https://bugzilla.suse.com/1099047"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2018-1000001",
"url": "https://bugzilla.suse.com/1123874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-1000001"
},
{
"cve": "CVE-2018-11236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-11236"
}
],
"notes": [
{
"category": "general",
"text": "stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-11236",
"url": "https://www.suse.com/security/cve/CVE-2018-11236"
},
{
"category": "external",
"summary": "SUSE Bug 1094161 for CVE-2018-11236",
"url": "https://bugzilla.suse.com/1094161"
},
{
"category": "external",
"summary": "SUSE Bug 1110160 for CVE-2018-11236",
"url": "https://bugzilla.suse.com/1110160"
},
{
"category": "external",
"summary": "SUSE Bug 1118435 for CVE-2018-11236",
"url": "https://bugzilla.suse.com/1118435"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2018-11236",
"url": "https://bugzilla.suse.com/1123874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-11236"
},
{
"cve": "CVE-2018-11237",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-11237"
}
],
"notes": [
{
"category": "general",
"text": "An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-11237",
"url": "https://www.suse.com/security/cve/CVE-2018-11237"
},
{
"category": "external",
"summary": "SUSE Bug 1092877 for CVE-2018-11237",
"url": "https://bugzilla.suse.com/1092877"
},
{
"category": "external",
"summary": "SUSE Bug 1094154 for CVE-2018-11237",
"url": "https://bugzilla.suse.com/1094154"
},
{
"category": "external",
"summary": "SUSE Bug 1118435 for CVE-2018-11237",
"url": "https://bugzilla.suse.com/1118435"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-11237"
},
{
"cve": "CVE-2018-19591",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19591"
}
],
"notes": [
{
"category": "general",
"text": "In the GNU C Library (aka glibc or libc6) through 2.28, attempting to resolve a crafted hostname via getaddrinfo() leads to the allocation of a socket descriptor that is not closed. This is related to the if_nametoindex() function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19591",
"url": "https://www.suse.com/security/cve/CVE-2018-19591"
},
{
"category": "external",
"summary": "SUSE Bug 1117603 for CVE-2018-19591",
"url": "https://bugzilla.suse.com/1117603"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-19591"
},
{
"cve": "CVE-2018-6485",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6485"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow in the implementation of the posix_memalign in memalign functions in the GNU C Library (aka glibc or libc6) 2.26 and earlier could cause these functions to return a pointer to a heap area that is too small, potentially leading to heap corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6485",
"url": "https://www.suse.com/security/cve/CVE-2018-6485"
},
{
"category": "external",
"summary": "SUSE Bug 1079036 for CVE-2018-6485",
"url": "https://bugzilla.suse.com/1079036"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2018-6485",
"url": "https://bugzilla.suse.com/1123874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-6485"
},
{
"cve": "CVE-2019-19126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19126"
}
],
"notes": [
{
"category": "general",
"text": "On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19126",
"url": "https://www.suse.com/security/cve/CVE-2019-19126"
},
{
"category": "external",
"summary": "SUSE Bug 1157292 for CVE-2019-19126",
"url": "https://bugzilla.suse.com/1157292"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-19126"
},
{
"cve": "CVE-2019-25013",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-25013"
}
],
"notes": [
{
"category": "general",
"text": "The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-25013",
"url": "https://www.suse.com/security/cve/CVE-2019-25013"
},
{
"category": "external",
"summary": "SUSE Bug 1182117 for CVE-2019-25013",
"url": "https://bugzilla.suse.com/1182117"
},
{
"category": "external",
"summary": "SUSE Bug 1220988 for CVE-2019-25013",
"url": "https://bugzilla.suse.com/1220988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-25013"
},
{
"cve": "CVE-2019-7309",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-7309"
}
],
"notes": [
{
"category": "general",
"text": "In the GNU C Library (aka glibc or libc6) through 2.29, the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-7309",
"url": "https://www.suse.com/security/cve/CVE-2019-7309"
},
{
"category": "external",
"summary": "SUSE Bug 1124100 for CVE-2019-7309",
"url": "https://bugzilla.suse.com/1124100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-7309"
},
{
"cve": "CVE-2019-9169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9169"
}
],
"notes": [
{
"category": "general",
"text": "In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9169",
"url": "https://www.suse.com/security/cve/CVE-2019-9169"
},
{
"category": "external",
"summary": "SUSE Bug 1127308 for CVE-2019-9169",
"url": "https://bugzilla.suse.com/1127308"
},
{
"category": "external",
"summary": "SUSE Bug 1146392 for CVE-2019-9169",
"url": "https://bugzilla.suse.com/1146392"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-9169"
},
{
"cve": "CVE-2020-10029",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10029"
}
],
"notes": [
{
"category": "general",
"text": "The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10029",
"url": "https://www.suse.com/security/cve/CVE-2020-10029"
},
{
"category": "external",
"summary": "SUSE Bug 1165784 for CVE-2020-10029",
"url": "https://bugzilla.suse.com/1165784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-10029"
},
{
"cve": "CVE-2020-1752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1752"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1752",
"url": "https://www.suse.com/security/cve/CVE-2020-1752"
},
{
"category": "external",
"summary": "SUSE Bug 1167631 for CVE-2020-1752",
"url": "https://bugzilla.suse.com/1167631"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-1752"
},
{
"cve": "CVE-2020-27618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27618"
}
],
"notes": [
{
"category": "general",
"text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27618",
"url": "https://www.suse.com/security/cve/CVE-2020-27618"
},
{
"category": "external",
"summary": "SUSE Bug 1178386 for CVE-2020-27618",
"url": "https://bugzilla.suse.com/1178386"
},
{
"category": "external",
"summary": "SUSE Bug 1220988 for CVE-2020-27618",
"url": "https://bugzilla.suse.com/1220988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-27618"
},
{
"cve": "CVE-2020-29562",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29562"
}
],
"notes": [
{
"category": "general",
"text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29562",
"url": "https://www.suse.com/security/cve/CVE-2020-29562"
},
{
"category": "external",
"summary": "SUSE Bug 1179694 for CVE-2020-29562",
"url": "https://bugzilla.suse.com/1179694"
},
{
"category": "external",
"summary": "SUSE Bug 1220988 for CVE-2020-29562",
"url": "https://bugzilla.suse.com/1220988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-29562"
},
{
"cve": "CVE-2020-29573",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29573"
}
],
"notes": [
{
"category": "general",
"text": "sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \\x00\\x04\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of \"Fixed for glibc 2.33\" in the 26649 reference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29573",
"url": "https://www.suse.com/security/cve/CVE-2020-29573"
},
{
"category": "external",
"summary": "SUSE Bug 1179721 for CVE-2020-29573",
"url": "https://bugzilla.suse.com/1179721"
},
{
"category": "external",
"summary": "SUSE Bug 1220988 for CVE-2020-29573",
"url": "https://bugzilla.suse.com/1220988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-29573"
},
{
"cve": "CVE-2020-6096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6096"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the \u0027num\u0027 parameter results in a signed comparison vulnerability. If an attacker underflows the \u0027num\u0027 parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6096",
"url": "https://www.suse.com/security/cve/CVE-2020-6096"
},
{
"category": "external",
"summary": "SUSE Bug 1168425 for CVE-2020-6096",
"url": "https://bugzilla.suse.com/1168425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-6096"
},
{
"cve": "CVE-2021-27645",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27645"
}
],
"notes": [
{
"category": "general",
"text": "The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27645",
"url": "https://www.suse.com/security/cve/CVE-2021-27645"
},
{
"category": "external",
"summary": "SUSE Bug 1182733 for CVE-2021-27645",
"url": "https://bugzilla.suse.com/1182733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-27645"
},
{
"cve": "CVE-2021-3326",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3326"
}
],
"notes": [
{
"category": "general",
"text": "The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3326",
"url": "https://www.suse.com/security/cve/CVE-2021-3326"
},
{
"category": "external",
"summary": "SUSE Bug 1181505 for CVE-2021-3326",
"url": "https://bugzilla.suse.com/1181505"
},
{
"category": "external",
"summary": "SUSE Bug 1212283 for CVE-2021-3326",
"url": "https://bugzilla.suse.com/1212283"
},
{
"category": "external",
"summary": "SUSE Bug 1220988 for CVE-2021-3326",
"url": "https://bugzilla.suse.com/1220988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3326"
},
{
"cve": "CVE-2021-33574",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33574"
}
],
"notes": [
{
"category": "general",
"text": "The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33574",
"url": "https://www.suse.com/security/cve/CVE-2021-33574"
},
{
"category": "external",
"summary": "SUSE Bug 1186489 for CVE-2021-33574",
"url": "https://bugzilla.suse.com/1186489"
},
{
"category": "external",
"summary": "SUSE Bug 1189426 for CVE-2021-33574",
"url": "https://bugzilla.suse.com/1189426"
},
{
"category": "external",
"summary": "SUSE Bug 1192788 for CVE-2021-33574",
"url": "https://bugzilla.suse.com/1192788"
},
{
"category": "external",
"summary": "SUSE Bug 1196766 for CVE-2021-33574",
"url": "https://bugzilla.suse.com/1196766"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:glibc-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-devel-static-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-extra-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-html-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-i18ndata-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-info-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-lang-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-locale-base-2.34-1.2.x86_64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.aarch64",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.s390x",
"openSUSE Tumbleweed:glibc-profile-2.34-1.2.x86_64",
"openSUSE Tumbleweed:nscd-2.34-1.2.aarch64",
"openSUSE Tumbleweed:nscd-2.34-1.2.ppc64le",
"openSUSE Tumbleweed:nscd-2.34-1.2.s390x",
"openSUSE Tumbleweed:nscd-2.34-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33574"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.