Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2014-6277
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T12:10:13.286Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-3093", }, { name: "SSRT101819", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "HPSBMU03245", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "JVN#55667175", tags: [ "third-party-advisory", "x_refsource_JVN", "x_transferred", ], url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "60433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60433", }, { name: "HPSBMU03143", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "HPSBST03155", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61816", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "61283", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61283", }, { name: "APPLE-SA-2015-09-30-3", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "61654", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61654", }, { name: "USN-2380-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2380-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62312", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61703", }, { name: "61065", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61065", }, { name: "HPSBST03129", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", tags: [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "61641", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61641", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { name: "SUSE-SU-2014:1287", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "MDVSA-2015:164", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT205267", }, { name: "HPSBMU03220", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60325", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60325", }, { name: "60024", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60024", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", }, { name: "20140926 GNU Bash Environment Variable Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "62343", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62343", }, { name: "61565", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61565", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.suse.com/support/shellshock/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/HT204244", }, { name: "HPSBST03157", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61313", }, { name: "SSRT101830", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "SSRT101742", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61485", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61485", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "HPSBST03154", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61312", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://linux.oracle.com/errata/ELSA-2014-3094", }, { name: "60193", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60193", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "60063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60063", }, { name: "60034", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60034", }, { name: "59907", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59907", }, { name: "58200", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61643", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61503", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "HPSBMU03236", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { name: "HPSBHF03145", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "61552", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61552", }, { name: "61780", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61780", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX200223", }, { name: "HPSBGN03138", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "60044", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60044", }, { name: "61291", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "61287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61287", }, { name: "HPSBHF03146", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "APPLE-SA-2015-01-27-4", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "HPSBGN03141", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "61128", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61128", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX200217", }, { name: "61471", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61471", }, { name: "60055", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60055", }, { name: "59961", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59961", }, { name: "61550", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61550", }, { name: "61633", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61633", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.novell.com/security/cve/CVE-2014-6277.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "61328", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61328", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61129", }, { name: "61603", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61603", }, { name: "61857", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61857", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-09-27T00:00:00", descriptions: [ { lang: "en", value: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-08-08T09:57:01", orgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", shortName: "debian", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-3093", }, { name: "SSRT101819", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "HPSBMU03245", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "JVN#55667175", tags: [ "third-party-advisory", "x_refsource_JVN", ], url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "60433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60433", }, { name: "HPSBMU03143", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "HPSBST03155", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61816", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "61283", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61283", }, { name: "APPLE-SA-2015-09-30-3", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "61654", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61654", }, { name: "USN-2380-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2380-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62312", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61703", }, { name: "61065", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61065", }, { name: "HPSBST03129", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", tags: [ "third-party-advisory", "x_refsource_JVNDB", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "61641", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61641", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { name: "SUSE-SU-2014:1287", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "MDVSA-2015:164", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT205267", }, { name: "HPSBMU03220", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60325", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60325", }, { name: "60024", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60024", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { tags: [ "x_refsource_MISC", ], url: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", }, { name: "20140926 GNU Bash Environment Variable Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "62343", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62343", }, { name: "61565", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61565", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.suse.com/support/shellshock/", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/HT204244", }, { name: "HPSBST03157", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61313", }, { name: "SSRT101830", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "SSRT101742", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61485", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61485", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "HPSBST03154", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61312", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://linux.oracle.com/errata/ELSA-2014-3094", }, { name: "60193", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60193", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "60063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60063", }, { name: "60034", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60034", }, { name: "59907", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59907", }, { name: "58200", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61643", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61503", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "HPSBMU03236", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { name: "HPSBHF03145", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "61552", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61552", }, { name: "61780", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61780", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX200223", }, { name: "HPSBGN03138", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "60044", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60044", }, { name: "61291", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "61287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61287", }, { name: "HPSBHF03146", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "APPLE-SA-2015-01-27-4", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "HPSBGN03141", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "61128", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61128", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX200217", }, { name: "61471", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61471", }, { name: "60055", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60055", }, { name: "59961", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59961", }, { name: "61550", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61550", }, { name: "61633", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61633", }, { tags: [ "x_refsource_MISC", ], url: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.novell.com/security/cve/CVE-2014-6277.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "61328", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61328", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61129", }, { name: "61603", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61603", }, { name: "61857", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61857", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@debian.org", ID: "CVE-2014-6277", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { name: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", refsource: "CONFIRM", url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { name: "http://linux.oracle.com/errata/ELSA-2014-3093", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-3093", }, { name: "SSRT101819", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "HPSBMU03245", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "JVN#55667175", refsource: "JVN", url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "60433", refsource: "SECUNIA", url: "http://secunia.com/advisories/60433", }, { name: "HPSBMU03143", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "HPSBST03155", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { name: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61816", refsource: "SECUNIA", url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", refsource: "SECUNIA", url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "61283", refsource: "SECUNIA", url: "http://secunia.com/advisories/61283", }, { name: "APPLE-SA-2015-09-30-3", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "61654", refsource: "SECUNIA", url: "http://secunia.com/advisories/61654", }, { name: "USN-2380-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2380-1", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", refsource: "SECUNIA", url: "http://secunia.com/advisories/62312", }, { name: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", refsource: "CONFIRM", url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", refsource: "SECUNIA", url: "http://secunia.com/advisories/61703", }, { name: "61065", refsource: "SECUNIA", url: "http://secunia.com/advisories/61065", }, { name: "HPSBST03129", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", refsource: "JVNDB", url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "61641", refsource: "SECUNIA", url: "http://secunia.com/advisories/61641", }, { name: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", refsource: "CONFIRM", url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { name: "SUSE-SU-2014:1287", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "MDVSA-2015:164", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { name: "https://support.apple.com/HT205267", refsource: "CONFIRM", url: "https://support.apple.com/HT205267", }, { name: "HPSBMU03220", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60325", refsource: "SECUNIA", url: "http://secunia.com/advisories/60325", }, { name: "60024", refsource: "SECUNIA", url: "http://secunia.com/advisories/60024", }, { name: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { name: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", refsource: "MISC", url: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", }, { name: "20140926 GNU Bash Environment Variable Command Injection Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "62343", refsource: "SECUNIA", url: "http://secunia.com/advisories/62343", }, { name: "61565", refsource: "SECUNIA", url: "http://secunia.com/advisories/61565", }, { name: "https://www.suse.com/support/shellshock/", refsource: "CONFIRM", url: "https://www.suse.com/support/shellshock/", }, { name: "http://support.apple.com/HT204244", refsource: "CONFIRM", url: "http://support.apple.com/HT204244", }, { name: "HPSBST03157", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", refsource: "SECUNIA", url: "http://secunia.com/advisories/61313", }, { name: "SSRT101830", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "SSRT101742", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61485", refsource: "SECUNIA", url: "http://secunia.com/advisories/61485", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "HPSBST03154", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", refsource: "SECUNIA", url: "http://secunia.com/advisories/61312", }, { name: "http://linux.oracle.com/errata/ELSA-2014-3094", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-3094", }, { name: "60193", refsource: "SECUNIA", url: "http://secunia.com/advisories/60193", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "60063", refsource: "SECUNIA", url: "http://secunia.com/advisories/60063", }, { name: "60034", refsource: "SECUNIA", url: "http://secunia.com/advisories/60034", }, { name: "59907", refsource: "SECUNIA", url: "http://secunia.com/advisories/59907", }, { name: "58200", refsource: "SECUNIA", url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", refsource: "SECUNIA", url: "http://secunia.com/advisories/61643", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015721", refsource: "CONFIRM", url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", refsource: "SECUNIA", url: "http://secunia.com/advisories/61503", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "HPSBMU03236", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { name: "HPSBHF03145", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { name: "http://www.qnap.com/i/en/support/con_show.php?cid=61", refsource: "CONFIRM", url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "61552", refsource: "SECUNIA", url: "http://secunia.com/advisories/61552", }, { name: "61780", refsource: "SECUNIA", url: "http://secunia.com/advisories/61780", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { name: "https://support.citrix.com/article/CTX200223", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX200223", }, { name: "HPSBGN03138", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "60044", refsource: "SECUNIA", url: "http://secunia.com/advisories/60044", }, { name: "61291", refsource: "SECUNIA", url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "61287", refsource: "SECUNIA", url: "http://secunia.com/advisories/61287", }, { name: "HPSBHF03146", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { name: "HPSBGN03233", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "APPLE-SA-2015-01-27-4", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "HPSBGN03141", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "61128", refsource: "SECUNIA", url: "http://secunia.com/advisories/61128", }, { name: "https://support.citrix.com/article/CTX200217", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX200217", }, { name: "61471", refsource: "SECUNIA", url: "http://secunia.com/advisories/61471", }, { name: "60055", refsource: "SECUNIA", url: "http://secunia.com/advisories/60055", }, { name: "59961", refsource: "SECUNIA", url: "http://secunia.com/advisories/59961", }, { name: "61550", refsource: "SECUNIA", url: "http://secunia.com/advisories/61550", }, { name: "61633", refsource: "SECUNIA", url: "http://secunia.com/advisories/61633", }, { name: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", refsource: "MISC", url: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { name: "http://support.novell.com/security/cve/CVE-2014-6277.html", refsource: "CONFIRM", url: "http://support.novell.com/security/cve/CVE-2014-6277.html", }, { name: "https://kb.bluecoat.com/index?page=content&id=SA82", refsource: "CONFIRM", url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "61328", refsource: "SECUNIA", url: "http://secunia.com/advisories/61328", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", refsource: "SECUNIA", url: "http://secunia.com/advisories/61129", }, { name: "61603", refsource: "SECUNIA", url: "http://secunia.com/advisories/61603", }, { name: "61857", refsource: "SECUNIA", url: "http://secunia.com/advisories/61857", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "79363d38-fa19-49d1-9214-5f28da3f3ac5", assignerShortName: "debian", cveId: "CVE-2014-6277", datePublished: "2014-09-27T22:00:00", dateReserved: "2014-09-09T00:00:00", dateUpdated: "2024-08-06T12:10:13.286Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2014-6277\",\"sourceIdentifier\":\"security@debian.org\",\"published\":\"2014-09-27T22:55:02.660\",\"lastModified\":\"2024-11-21T02:14:04.890\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.\"},{\"lang\":\"es\",\"value\":\"GNU Bash hasta 4.3 bash43-026 no analiza debidamente las definiciones de funciones en los valores de las variables de entornos, lo que permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (acceso a memoria no inicializada, y operaciones de leer y escribir de puntero no confiables) a través de un entorno manipulado, como fue demostrado por vectores que involucran la característica ForceCommand en OpenSSH sshd, los módulos mod_cgi y mod_cgid en el servidor de Apache HTTP , secuencias de comandos ejecutados por clientes DHCP no especificados, y otras situaciones en que la configuración del entorno ocurre cruzando un límite de privilegios de la ejecución de Bash. NOTA: esta vulnerabilidad existe debido a una solución incompleta para CVE-2014-6271 y CVE-2014-7169.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCAC75DF-FFF7-4721-9D47-6E29A5CCB7C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCF4B4BB-C5A0-4283-9657-FC61BC95C014\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B04CBBD-E855-48D7-A5C9-AEC2B38FF1F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"972BDA0A-25C8-4C02-8624-07D2462C214C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B9EDE56-A8C4-40A8-9D14-F6E86F464BD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAB4B8E1-E013-4DB5-AF65-70CC2AEC3B20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5428D5A-7443-4BDD-9690-E44DBDBCAC9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18A6E8C3-334D-443B-8AD6-F8A131490F4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C74DAE6-8A77-47BF-B3ED-D76CD5AD75BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B631B7E-C59D-444F-80CE-DC2345A56E97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91C8E637-AD10-4854-AD60-A908D017DDA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75AB7456-89E4-4F40-82D0-EED52CAEE670\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7E516F7-B6C6-4A0B-90F4-BC0F382E62E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E37A5D0-79EB-442D-B4B8-49F5137A3FA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE919509-57B0-4D13-9503-943D5BFED620\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F027515-A126-4899-B78E-121C8312002F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC05A483-FAFD-4C40-85BC-D2EE907B2B54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"097C61C9-4761-4D8F-9590-376FC1A5522B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCA81069-36E0-4035-B31F-A5281E10C760\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC216C39-2EA0-4B58-87EA-81A737E5D2E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88731DFF-B0B1-4325-A662-287D5E6E7265\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7BB3ECE-0E83-45EB-AC27-BA29E2C52D1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FA313D8-2B28-4C73-A96B-7814C37F0725\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43630818-4A62-4766-AADC-AB87BE1C5553\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"202B9DB4-80DC-4D1C-8DA8-C06E89FF542A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37CB667F-26C8-46FA-81CE-1F6909AC006D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"755984AB-D061-45F0-8845-D7B78BA506E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC1DAC9F-711C-47EA-9BBC-0EDB2AF0A1AC\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/jp/JVN55667175/index.html\",\"source\":\"security@debian.org\"},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126\",\"source\":\"security@debian.org\"},{\"url\":\"http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html\",\"source\":\"security@debian.org\"},{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-3093\",\"source\":\"security@debian.org\"},{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-3094\",\"source\":\"security@debian.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html\",\"source\":\"security@debian.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html\",\"source\":\"security@debian.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html\",\"source\":\"security@debian.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141330468527613&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141345648114150&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383026420882&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383081521087&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383196021590&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383244821813&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383304022067&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383353622268&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383465822787&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141450491804793&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141576728022234&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141577137423233&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141577241923505&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141577297623641&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141585637922673&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141879528318582&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141879528318582&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142118135300698&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142118135300698&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142118135300698&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142289270617409&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142289270617409&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142358026505815&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142358026505815&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142358078406056&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142721162228379&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142721162228379&w=2\",\"source\":\"security@debian.org\"},{\"url\":\"http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/58200\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/59907\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/59961\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/60024\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/60034\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/60044\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/60055\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/60063\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/60193\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/60325\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/60433\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61065\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61128\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61129\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61283\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61287\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61291\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61312\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61313\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61328\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61442\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61471\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61485\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61503\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61550\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61552\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61565\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61603\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61633\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61641\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61643\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61654\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61703\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61780\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61816\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/61857\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/62312\",\"source\":\"security@debian.org\"},{\"url\":\"http://secunia.com/advisories/62343\",\"source\":\"security@debian.org\"},{\"url\":\"http://support.apple.com/HT204244\",\"source\":\"security@debian.org\"},{\"url\":\"http://support.novell.com/security/cve/CVE-2014-6277.html\",\"source\":\"security@debian.org\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\",\"source\":\"security@debian.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272\",\"source\":\"security@debian.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279\",\"source\":\"security@debian.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361\",\"source\":\"security@debian.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879\",\"source\":\"security@debian.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897\",\"source\":\"security@debian.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898\",\"source\":\"security@debian.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915\",\"source\":\"security@debian.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685541\",\"source\":\"security@debian.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685604\",\"source\":\"security@debian.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685733\",\"source\":\"security@debian.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685749\",\"source\":\"security@debian.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685914\",\"source\":\"security@debian.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686131\",\"source\":\"security@debian.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686246\",\"source\":\"security@debian.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686445\",\"source\":\"security@debian.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686479\",\"source\":\"security@debian.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686494\",\"source\":\"security@debian.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21687079\",\"source\":\"security@debian.org\"},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315\",\"source\":\"security@debian.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:164\",\"source\":\"security@debian.org\"},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015721\",\"source\":\"security@debian.org\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html\",\"source\":\"security@debian.org\"},{\"url\":\"http://www.qnap.com/i/en/support/con_show.php?cid=61\",\"source\":\"security@debian.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2380-1\",\"source\":\"security@debian.org\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2014-0010.html\",\"source\":\"security@debian.org\"},{\"url\":\"https://kb.bluecoat.com/index?page=content&id=SA82\",\"source\":\"security@debian.org\"},{\"url\":\"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648\",\"source\":\"security@debian.org\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content&id=SB10085\",\"source\":\"security@debian.org\"},{\"url\":\"https://support.apple.com/HT205267\",\"source\":\"security@debian.org\"},{\"url\":\"https://support.citrix.com/article/CTX200217\",\"source\":\"security@debian.org\"},{\"url\":\"https://support.citrix.com/article/CTX200223\",\"source\":\"security@debian.org\"},{\"url\":\"https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html\",\"source\":\"security@debian.org\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075\",\"source\":\"security@debian.org\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183\",\"source\":\"security@debian.org\"},{\"url\":\"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts\",\"source\":\"security@debian.org\"},{\"url\":\"https://www.suse.com/support/shellshock/\",\"source\":\"security@debian.org\"},{\"url\":\"http://jvn.jp/en/jp/JVN55667175/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-3093\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-3094\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141330468527613&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141345648114150&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383026420882&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383081521087&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383196021590&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383244821813&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383304022067&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383353622268&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383465822787&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141450491804793&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141576728022234&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141577137423233&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141577241923505&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141577297623641&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141585637922673&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141879528318582&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141879528318582&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142118135300698&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142118135300698&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142118135300698&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142289270617409&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142289270617409&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142358026505815&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142358026505815&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142358078406056&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142721162228379&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142721162228379&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/58200\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59907\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59961\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60024\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60034\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60044\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60055\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60063\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60193\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60325\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60433\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61065\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61128\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61129\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61283\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61287\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61291\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61312\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61313\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61328\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61442\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61485\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61503\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61550\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61552\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61565\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61603\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61633\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61641\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61643\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61654\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61703\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61780\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61816\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61857\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62312\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62343\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/HT204244\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.novell.com/security/cve/CVE-2014-6277.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685541\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685604\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685733\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685749\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685914\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686131\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686246\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686445\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686494\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21687079\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:164\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015721\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.qnap.com/i/en/support/con_show.php?cid=61\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2380-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2014-0010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kb.bluecoat.com/index?page=content&id=SA82\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content&id=SB10085\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/HT205267\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.citrix.com/article/CTX200217\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.citrix.com/article/CTX200223\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.suse.com/support/shellshock/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", }, }
cve-2014-6277
Vulnerability from jvndb
▼ | Vendor | Product |
---|---|---|
QNAP Systems | QNAP QTS |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000126.html", "dc:date": "2015-12-25T13:47+09:00", "dcterms:issued": "2014-10-28T14:39+09:00", "dcterms:modified": "2015-12-25T13:47+09:00", description: "QNAP QTS is an operating system for Turbo NAS. QNAP QTS contains a flaw in the GNU Bash shell, which may result in an OS command injection vulnerability (CWE-78).\r\n\r\nYuuki Wakisaka of University of Electro-Communications reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", link: "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000126.html", "sec:cpe": { "#text": "cpe:/o:qnap:qts", "@product": "QNAP QTS", "@vendor": "QNAP Systems", "@version": "2.2", }, "sec:cvss": { "@score": "10.0", "@severity": "High", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "@version": "2.0", }, "sec:identifier": "JVNDB-2014-000126", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN55667175/index.html", "@id": "JVN#55667175", "@source": "JVN", }, { "#text": "https://jvn.jp/vu/JVNVU97219505/index.html", "@id": "JVNVU#97219505", "@source": "JVN", }, { "#text": "http://jvn.jp/vu/JVNVU97220341/index.html", "@id": "JVNVU#97220341", "@source": "JVN", }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004399.html", "@id": "JVNDB-2014-004399", "@source": "JVN iPedia", }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004410.html", "@id": "JVNDB-2014-004410", "@source": "JVN iPedia", }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004431.html", "@id": "JVNDB-2014-004431", "@source": "JVN iPedia", }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004476.html", "@id": "JVNDB-2014-004476", "@source": "JVN iPedia", }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004432.html", "@id": "JVNDB-2014-004432", "@source": "JVN iPedia", }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004433.html", "@id": "JVNDB-2014-004433", "@source": "JVN iPedia", }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169", "@id": "CVE-2014-7169", "@source": "CVE", }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271", "@id": "CVE-2014-6271", "@source": "CVE", }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277", "@id": "CVE-2014-6277", "@source": "CVE", }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278", "@id": "CVE-2014-6278", "@source": "CVE", }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186", "@id": "CVE-2014-7186", "@source": "CVE", }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187", "@id": "CVE-2014-7187", "@source": "CVE", }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169", "@id": "CVE-2014-7169", "@source": "NVD", }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271", "@id": "CVE-2014-6271", "@source": "NVD", }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6277", "@id": "CVE-2014-6277", "@source": "NVD", }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6278", "@id": "CVE-2014-6278", "@source": "NVD", }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7186", "@id": "CVE-2014-7186", "@source": "NVD", }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7187", "@id": "CVE-2014-7187", "@source": "NVD", }, { "#text": "http://www.kb.cert.org/vuls/id/252743", "@id": "VU#252743", "@source": "CERT-VN", }, { "#text": "https://ics-cert.us-cert.gov/advisories/ICSA-15-344-01", "@id": "ICSA-15-344-01", "@source": "ICS-CERT ADVISORY", }, { "#text": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-269-01a", "@id": "ICSA-14-269-01A", "@source": "ICS-CERT ADVISORY", }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-78", "@title": "OS Command Injection(CWE-78)", }, ], title: "QNAP QTS vulnerable to OS command injection", }
gsd-2014-6277
Vulnerability from gsd
{ GSD: { alias: "CVE-2014-6277", description: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", id: "GSD-2014-6277", references: [ "https://www.suse.com/security/cve/CVE-2014-6277.html", "https://ubuntu.com/security/CVE-2014-6277", "https://advisories.mageia.org/CVE-2014-6277.html", "https://security.archlinux.org/CVE-2014-6277", "https://linux.oracle.com/cve/CVE-2014-6277.html", "https://packetstormsecurity.com/files/cve/CVE-2014-6277", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2014-6277", ], details: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", id: "GSD-2014-6277", modified: "2023-12-13T01:22:50.281377Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "security@debian.org", ID: "CVE-2014-6277", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { name: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", refsource: "CONFIRM", url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { name: "http://linux.oracle.com/errata/ELSA-2014-3093", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-3093", }, { name: "SSRT101819", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "HPSBMU03245", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "JVN#55667175", refsource: "JVN", url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "60433", refsource: "SECUNIA", url: "http://secunia.com/advisories/60433", }, { name: "HPSBMU03143", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "HPSBST03155", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { name: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61816", refsource: "SECUNIA", url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", refsource: "SECUNIA", url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "61283", refsource: "SECUNIA", url: "http://secunia.com/advisories/61283", }, { name: "APPLE-SA-2015-09-30-3", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "61654", refsource: "SECUNIA", url: "http://secunia.com/advisories/61654", }, { name: "USN-2380-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2380-1", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", refsource: "SECUNIA", url: "http://secunia.com/advisories/62312", }, { name: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", refsource: "CONFIRM", url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", refsource: "SECUNIA", url: "http://secunia.com/advisories/61703", }, { name: "61065", refsource: "SECUNIA", url: "http://secunia.com/advisories/61065", }, { name: "HPSBST03129", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", refsource: "JVNDB", url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "61641", refsource: "SECUNIA", url: "http://secunia.com/advisories/61641", }, { name: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", refsource: "CONFIRM", url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { name: "SUSE-SU-2014:1287", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "MDVSA-2015:164", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { name: "https://support.apple.com/HT205267", refsource: "CONFIRM", url: "https://support.apple.com/HT205267", }, { name: "HPSBMU03220", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60325", refsource: "SECUNIA", url: "http://secunia.com/advisories/60325", }, { name: "60024", refsource: "SECUNIA", url: "http://secunia.com/advisories/60024", }, { name: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { name: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", refsource: "MISC", url: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", }, { name: "20140926 GNU Bash Environment Variable Command Injection Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "62343", refsource: "SECUNIA", url: "http://secunia.com/advisories/62343", }, { name: "61565", refsource: "SECUNIA", url: "http://secunia.com/advisories/61565", }, { name: "https://www.suse.com/support/shellshock/", refsource: "CONFIRM", url: "https://www.suse.com/support/shellshock/", }, { name: "http://support.apple.com/HT204244", refsource: "CONFIRM", url: "http://support.apple.com/HT204244", }, { name: "HPSBST03157", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", refsource: "SECUNIA", url: "http://secunia.com/advisories/61313", }, { name: "SSRT101830", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "SSRT101742", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61485", refsource: "SECUNIA", url: "http://secunia.com/advisories/61485", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "HPSBST03154", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", refsource: "SECUNIA", url: "http://secunia.com/advisories/61312", }, { name: "http://linux.oracle.com/errata/ELSA-2014-3094", refsource: "CONFIRM", url: "http://linux.oracle.com/errata/ELSA-2014-3094", }, { name: "60193", refsource: "SECUNIA", url: "http://secunia.com/advisories/60193", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "60063", refsource: "SECUNIA", url: "http://secunia.com/advisories/60063", }, { name: "60034", refsource: "SECUNIA", url: "http://secunia.com/advisories/60034", }, { name: "59907", refsource: "SECUNIA", url: "http://secunia.com/advisories/59907", }, { name: "58200", refsource: "SECUNIA", url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", refsource: "SECUNIA", url: "http://secunia.com/advisories/61643", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015721", refsource: "CONFIRM", url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", refsource: "SECUNIA", url: "http://secunia.com/advisories/61503", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "HPSBMU03236", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { name: "HPSBHF03145", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { name: "http://www.qnap.com/i/en/support/con_show.php?cid=61", refsource: "CONFIRM", url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "61552", refsource: "SECUNIA", url: "http://secunia.com/advisories/61552", }, { name: "61780", refsource: "SECUNIA", url: "http://secunia.com/advisories/61780", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { name: "https://support.citrix.com/article/CTX200223", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX200223", }, { name: "HPSBGN03138", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "60044", refsource: "SECUNIA", url: "http://secunia.com/advisories/60044", }, { name: "61291", refsource: "SECUNIA", url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "61287", refsource: "SECUNIA", url: "http://secunia.com/advisories/61287", }, { name: "HPSBHF03146", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { name: "HPSBGN03233", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "APPLE-SA-2015-01-27-4", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "HPSBGN03141", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "61128", refsource: "SECUNIA", url: "http://secunia.com/advisories/61128", }, { name: "https://support.citrix.com/article/CTX200217", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX200217", }, { name: "61471", refsource: "SECUNIA", url: "http://secunia.com/advisories/61471", }, { name: "60055", refsource: "SECUNIA", url: "http://secunia.com/advisories/60055", }, { name: "59961", refsource: "SECUNIA", url: "http://secunia.com/advisories/59961", }, { name: "61550", refsource: "SECUNIA", url: "http://secunia.com/advisories/61550", }, { name: "61633", refsource: "SECUNIA", url: "http://secunia.com/advisories/61633", }, { name: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", refsource: "MISC", url: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { name: "http://support.novell.com/security/cve/CVE-2014-6277.html", refsource: "CONFIRM", url: "http://support.novell.com/security/cve/CVE-2014-6277.html", }, { name: "https://kb.bluecoat.com/index?page=content&id=SA82", refsource: "CONFIRM", url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "61328", refsource: "SECUNIA", url: "http://secunia.com/advisories/61328", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", refsource: "SECUNIA", url: "http://secunia.com/advisories/61129", }, { name: "61603", refsource: "SECUNIA", url: "http://secunia.com/advisories/61603", }, { name: "61857", refsource: "SECUNIA", url: "http://secunia.com/advisories/61857", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "security@debian.org", ID: "CVE-2014-6277", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-78", }, ], }, ], }, references: { reference_data: [ { name: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", refsource: "MISC", tags: [ "Exploit", "Patch", ], url: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", }, { name: "https://www.suse.com/support/shellshock/", refsource: "CONFIRM", tags: [], url: "https://www.suse.com/support/shellshock/", }, { name: "http://support.novell.com/security/cve/CVE-2014-6277.html", refsource: "CONFIRM", tags: [], url: "http://support.novell.com/security/cve/CVE-2014-6277.html", }, { name: "61641", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61641", }, { name: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", refsource: "MISC", tags: [], url: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", }, { name: "https://kb.bluecoat.com/index?page=content&id=SA82", refsource: "CONFIRM", tags: [], url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "20140926 GNU Bash Environment Variable Command Injection Vulnerability", refsource: "CISCO", tags: [], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "61485", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61485", }, { name: "59907", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/59907", }, { name: "USN-2380-1", refsource: "UBUNTU", tags: [], url: "http://www.ubuntu.com/usn/USN-2380-1", }, { name: "61654", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61654", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", refsource: "MISC", tags: [], url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { name: "61565", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61565", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015721", refsource: "CONFIRM", tags: [], url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", refsource: "CONFIRM", tags: [], url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "61643", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61643", }, { name: "61503", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61503", }, { name: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", refsource: "CONFIRM", tags: [], url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { name: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", refsource: "CONFIRM", tags: [], url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61633", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61633", }, { name: "61552", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61552", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "61703", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61703", }, { name: "61283", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61283", }, { name: "61603", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61603", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "SUSE-SU-2014:1287", refsource: "SUSE", tags: [], url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { name: "HPSBGN03138", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "HPSBHF03125", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "https://support.citrix.com/article/CTX200217", refsource: "CONFIRM", tags: [], url: "https://support.citrix.com/article/CTX200217", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, { name: "60034", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/60034", }, { name: "61816", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61816", }, { name: "61128", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61128", }, { name: "61313", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61313", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61442", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61442", }, { name: "61287", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61287", }, { name: "https://support.citrix.com/article/CTX200223", refsource: "CONFIRM", tags: [], url: "https://support.citrix.com/article/CTX200223", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { name: "60055", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/60055", }, { name: "61129", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61129", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { name: "61780", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61780", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", refsource: "CONFIRM", tags: [], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { name: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", refsource: "CONFIRM", tags: [], url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "61471", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61471", }, { name: "61328", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61328", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { name: "58200", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/58200", }, { name: "61857", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61857", }, { name: "60193", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/60193", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "61065", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61065", }, { name: "61550", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61550", }, { name: "60325", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/60325", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "61312", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61312", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { name: "60063", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/60063", }, { name: "61291", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61291", }, { name: "60044", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/60044", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { name: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", refsource: "CONFIRM", tags: [], url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "60433", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/60433", }, { name: "60024", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/60024", }, { name: "HPSBHF03146", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { name: "HPSBGN03141", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "HPSBGN03142", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "openSUSE-SU-2014:1310", refsource: "SUSE", tags: [], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "HPSBST03157", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "JVN#55667175", refsource: "JVN", tags: [], url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "HPSBMU03144", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { name: "http://www.qnap.com/i/en/support/con_show.php?cid=61", refsource: "CONFIRM", tags: [], url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "HPSBMU03143", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "JVNDB-2014-000126", refsource: "JVNDB", tags: [], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "HPSBST03129", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBHF03145", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { name: "HPSBMU03165", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { name: "HPSBST03181", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "HPSBST03155", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { name: "HPSBST03154", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { name: "HPSBMU03182", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "62312", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/62312", }, { name: "59961", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/59961", }, { name: "62343", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/62343", }, { name: "http://linux.oracle.com/errata/ELSA-2014-3093", refsource: "CONFIRM", tags: [], url: "http://linux.oracle.com/errata/ELSA-2014-3093", }, { name: "http://linux.oracle.com/errata/ELSA-2014-3094", refsource: "CONFIRM", tags: [], url: "http://linux.oracle.com/errata/ELSA-2014-3094", }, { name: "APPLE-SA-2015-01-27-4", refsource: "APPLE", tags: [], url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "http://support.apple.com/HT204244", refsource: "CONFIRM", tags: [], url: "http://support.apple.com/HT204244", }, { name: "HPSBMU03245", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "HPSBMU03246", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "SSRT101830", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "HPSBMU03217", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "SSRT101868", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101819", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "MDVSA-2015:164", refsource: "MANDRIVA", tags: [], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { name: "APPLE-SA-2015-09-30-3", refsource: "APPLE", tags: [], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { name: "https://support.apple.com/HT205267", refsource: "CONFIRM", tags: [], url: "https://support.apple.com/HT205267", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", refsource: "CONFIRM", tags: [], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", refsource: "CONFIRM", tags: [], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", refsource: "CONFIRM", tags: [], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, }, lastModifiedDate: "2018-08-09T01:29Z", publishedDate: "2014-09-27T22:55Z", }, }, }
var-201409-0366
Vulnerability from variot
GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169. GNU Bash 4.3 and earlier contains a command injection vulnerability that may allow remote code execution. This vulnerability CVE-2014-6271 and CVE-2014-7169 Vulnerability due to insufficient fix for.Arbitrary code execution or denial of service by a third party through a crafted environment ( Uninitialized memory access and untrusted pointer read and write operations ) There is a possibility of being put into a state. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2015-09-30-3 OS X El Capitan 10.11
OS X El Capitan 10.11 is now available and addresses the following:
Address Book Available for: Mac OS X v10.6.8 and later Impact: A local attacker may be able to inject arbitrary code to processes loading the Address Book framework Description: An issue existed in Address Book framework's handling of an environment variable. This issue was addressed through improved environment variable handling. CVE-ID CVE-2015-5897 : Dan Bastone of Gotham Digital Science
AirScan Available for: Mac OS X v10.6.8 and later Impact: An attacker with a privileged network position may be able to extract payload from eSCL packets sent over a secure connection Description: An issue existed in the processing of eSCL packets. This issue was addressed through improved validation checks. CVE-ID CVE-2015-5853 : an anonymous researcher
apache_mod_php Available for: Mac OS X v10.6.8 and later Impact: Multiple vulnerabilities in PHP Description: Multiple vulnerabilities existed in PHP versions prior to 5.5.27, including one which may have led to remote code execution. This issue was addressed by updating PHP to version 5.5.27. CVE-ID CVE-2014-9425 CVE-2014-9427 CVE-2014-9652 CVE-2014-9705 CVE-2014-9709 CVE-2015-0231 CVE-2015-0232 CVE-2015-0235 CVE-2015-0273 CVE-2015-1351 CVE-2015-1352 CVE-2015-2301 CVE-2015-2305 CVE-2015-2331 CVE-2015-2348 CVE-2015-2783 CVE-2015-2787 CVE-2015-3329 CVE-2015-3330
Apple Online Store Kit Available for: Mac OS X v10.6.8 and later Impact: A malicious application may gain access to a user's keychain items Description: An issue existed in validation of access control lists for iCloud keychain items. This issue was addressed through improved access control list checks. CVE-ID CVE-2015-5836 : XiaoFeng Wang of Indiana University, Luyi Xing of Indiana University, Tongxin Li of Peking University, Tongxin Li of Peking University, Xiaolong Bai of Tsinghua University
AppleEvents Available for: Mac OS X v10.6.8 and later Impact: A user connected through screen sharing can send Apple Events to a local user's session Description: An issue existed with Apple Event filtering that allowed some users to send events to other users. This was addressed by improved Apple Event handling. CVE-ID CVE-2015-5849 : Jack Lawrence (@_jackhl)
Audio Available for: Mac OS X v10.6.8 and later Impact: Playing a malicious audio file may lead to an unexpected application termination Description: A memory corruption issue existed in the handling of audio files. This issue issue was addressed through improved memory handling. CVE-ID CVE-2015-5862 : YoungJin Yoon of Information Security Lab. (Adv.: Prof. Taekyoung Kwon), Yonsei University, Seoul, Korea
bash Available for: Mac OS X v10.6.8 and later Impact: Multiple vulnerabilities in bash Description: Multiple vulnerabilities existed in bash versions prior to 3.2 patch level 57. These issues were addressed by updating bash version 3.2 to patch level 57. CVE-ID CVE-2014-6277 CVE-2014-7186 CVE-2014-7187
Certificate Trust Policy Available for: Mac OS X v10.6.8 and later Impact: Update to the certificate trust policy Description: The certificate trust policy was updated. The complete list of certificates may be viewed at https://support.apple.com/en- us/HT202858.
CFNetwork Cookies Available for: Mac OS X v10.6.8 and later Impact: An attacker in a privileged network position can track a user's activity Description: A cross-domain cookie issue existed in the handling of top level domains. The issue was address through improved restrictions of cookie creation. CVE-ID CVE-2015-5885 : Xiaofeng Zheng of Blue Lotus Team, Tsinghua University
CFNetwork FTPProtocol Available for: Mac OS X v10.6.8 and later Impact: Malicious FTP servers may be able to cause the client to perform reconnaissance on other hosts Description: An issue existed in the handling of FTP packets when using the PASV command. This issue was resolved through improved validation. CVE-ID CVE-2015-5912 : Amit Klein
CFNetwork HTTPProtocol Available for: Mac OS X v10.6.8 and later Impact: A maliciously crafted URL may be able to bypass HSTS and leak sensitive data Description: A URL parsing vulnerability existed in HSTS handling. This issue was addressed through improved URL parsing. CVE-ID CVE-2015-5858 : Xiaofeng Zheng of Blue Lotus Team, Tsinghua University
CFNetwork HTTPProtocol Available for: Mac OS X v10.6.8 and later Impact: A malicious website may be able to track users in Safari private browsing mode Description: An issue existed in the handling of HSTS state in Safari private browsing mode. This issue was addressed through improved state handling. CVE-ID CVE-2015-5860 : Sam Greenhalgh of RadicalResearch Ltd
CFNetwork Proxies Available for: Mac OS X v10.6.8 and later Impact: Connecting to a malicious web proxy may set malicious cookies for a website Description: An issue existed in the handling of proxy connect responses. This issue was addressed by removing the set-cookie header while parsing the connect response. CVE-ID CVE-2015-5841 : Xiaofeng Zheng of Blue Lotus Team, Tsinghua University
CFNetwork SSL Available for: Mac OS X v10.6.8 and later Impact: An attacker with a privileged network position may intercept SSL/TLS connections Description: A certificate validation issue existed in NSURL when a certificate changed. This issue was addressed through improved certificate validation. CVE-ID CVE-2015-5824 : Timothy J. Wood of The Omni Group
CFNetwork SSL Available for: Mac OS X v10.6.8 and later Impact: An attacker may be able to decrypt data protected by SSL Description: There are known attacks on the confidentiality of RC4. An attacker could force the use of RC4, even if the server preferred better ciphers, by blocking TLS 1.0 and higher connections until CFNetwork tried SSL 3.0, which only allows RC4. This issue was addressed by removing the fallback to SSL 3.0.
CoreCrypto Available for: Mac OS X v10.6.8 and later Impact: An attacker may be able to determine a private key Description: By observing many signing or decryption attempts, an attacker may have been able to determine the RSA private key. This issue was addressed using improved encryption algorithms.
CoreText Available for: Mac OS X v10.6.8 and later Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2015-5874 : John Villamil (@day6reak), Yahoo Pentest Team
Dev Tools Available for: Mac OS X v10.6.8 and later Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in dyld. This was addressed through improved memory handling. CVE-ID CVE-2015-5876 : beist of grayhash
Dev Tools Available for: Mac OS X v10.6.8 and later Impact: An application may be able to bypass code signing Description: An issue existed with validation of the code signature of executables. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-5839 : @PanguTeam
Disk Images Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in DiskImages. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5847 : Filippo Bigarella, Luca Todesco
dyld Available for: Mac OS X v10.6.8 and later Impact: An application may be able to bypass code signing Description: An issue existed with validation of the code signature of executables. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-5839 : TaiG Jailbreak Team
EFI Available for: Mac OS X v10.6.8 and later Impact: A malicious application can prevent some systems from booting Description: An issue existed with the addresses covered by the protected range register. This issue was fixed by changing the protected range. CVE-ID CVE-2015-5900 : Xeno Kovah & Corey Kallenberg from LegbaCore
EFI Available for: Mac OS X v10.6.8 and later Impact: A malicious Apple Ethernet Thunderbolt adapter may be able to affect firmware flashing Description: Apple Ethernet Thunderbolt adapters could modify the host firmware if connected during an EFI update. This issue was addressed by not loading option ROMs during updates. CVE-ID CVE-2015-5914 : Trammell Hudson of Two Sigma Investments and snare
Finder Available for: Mac OS X v10.6.8 and later Impact: The "Secure Empty Trash" feature may not securely delete files placed in the Trash Description: An issue existed in guaranteeing secure deletion of Trash files on some systems, such as those with flash storage. This issue was addressed by removing the "Secure Empty Trash" option. CVE-ID CVE-2015-5901 : Apple
Game Center Available for: Mac OS X v10.6.8 and later Impact: A malicious Game Center application may be able to access a player's email address Description: An issue existed in Game Center in the handling of a player's email. This issue was addressed through improved access restrictions. CVE-ID CVE-2015-5855 : Nasser Alnasser
Heimdal Available for: Mac OS X v10.6.8 and later Impact: An attacker may be able to replay Kerberos credentials to the SMB server Description: An authentication issue existed in Kerberos credentials. This issue was addressed through additional validation of credentials using a list of recently seen credentials. CVE-ID CVE-2015-5913 : Tarun Chopra of Microsoft Corporation, U.S. and Yu Fan of Microsoft Corporation, China
ICU Available for: Mac OS X v10.6.8 and later Impact: Multiple vulnerabilities in ICU Description: Multiple vulnerabilities existed in ICU versions prior to 53.1.0. These issues were addressed by updating ICU to version 55.1. CVE-ID CVE-2014-8146 CVE-2014-8147 CVE-2015-5922
Install Framework Legacy Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to gain root privileges Description: A restriction issue existed in the Install private framework containing a privileged executable. This issue was addressed by removing the executable. CVE-ID CVE-2015-5888 : Apple
Intel Graphics Driver Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to execute arbitrary code with system privileges Description: Multiple memory corruption issues existed in the Intel Graphics Driver. These issues were addressed through improved memory handling. CVE-ID CVE-2015-5830 : Yuki MIZUNO (@mzyy94) CVE-2015-5877 : Camillus Gerard Cai
IOAudioFamily Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to determine kernel memory layout Description: An issue existed in IOAudioFamily that led to the disclosure of kernel memory content. This issue was addressed by permuting kernel pointers. CVE-ID CVE-2015-5864 : Luca Todesco
IOGraphics Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues existed in the kernel. These issues were addressed through improved memory handling. CVE-ID CVE-2015-5871 : Ilja van Sprundel of IOActive CVE-2015-5872 : Ilja van Sprundel of IOActive CVE-2015-5873 : Ilja van Sprundel of IOActive CVE-2015-5890 : Ilja van Sprundel of IOActive
IOGraphics Available for: Mac OS X v10.6.8 and later Impact: A malicious application may be able to determine kernel memory layout Description: An issue existed in IOGraphics which could have led to the disclosure of kernel memory layout. This issue was addressed through improved memory management. CVE-ID CVE-2015-5865 : Luca Todesco
IOHIDFamily Available for: Mac OS X v10.6.8 and later Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Multiple memory corruption issues existed in IOHIDFamily. These issues were addressed through improved memory handling. CVE-ID CVE-2015-5866 : Apple CVE-2015-5867 : moony li of Trend Micro
IOStorageFamily Available for: Mac OS X v10.6.8 and later Impact: A local attacker may be able to read kernel memory Description: A memory initialization issue existed in the kernel. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5863 : Ilja van Sprundel of IOActive
Kernel Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: Multiple memory corruption issues existed in the Kernel. These issues were addressed through improved memory handling. CVE-ID CVE-2015-5868 : Cererdlong of Alibaba Mobile Security Team CVE-2015-5896 : Maxime Villard of m00nbsd CVE-2015-5903 : CESG
Kernel Available for: Mac OS X v10.6.8 and later Impact: A local process can modify other processes without entitlement checks Description: An issue existed where root processes using the processor_set_tasks API were allowed to retrieve the task ports of other processes. This issue was addressed through additional entitlement checks. CVE-ID CVE-2015-5882 : Pedro Vilaca, working from original research by Ming-chieh Pan and Sung-ting Tsai; Jonathan Levin
Kernel Available for: Mac OS X v10.6.8 and later Impact: A local attacker may control the value of stack cookies Description: Multiple weaknesses existed in the generation of user space stack cookies. These issues were addressed through improved generation of stack cookies. CVE-ID CVE-2013-3951 : Stefan Esser
Kernel Available for: Mac OS X v10.6.8 and later Impact: An attacker may be able to launch denial of service attacks on targeted TCP connections without knowing the correct sequence number Description: An issue existed in xnu's validation of TCP packet headers. This issue was addressed through improved TCP packet header validation. CVE-ID CVE-2015-5879 : Jonathan Looney
Kernel Available for: Mac OS X v10.6.8 and later Impact: An attacker in a local LAN segment may disable IPv6 routing Description: An insufficient validation issue existed in the handling of IPv6 router advertisements that allowed an attacker to set the hop limit to an arbitrary value. This issue was addressed by enforcing a minimum hop limit. CVE-ID CVE-2015-5869 : Dennis Spindel Ljungmark
Kernel Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to determine kernel memory layout Description: An issue existed that led to the disclosure of kernel memory layout. This was addressed through improved initialization of kernel memory structures. CVE-ID CVE-2015-5842 : beist of grayhash
Kernel Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to determine kernel memory layout Description: An issue existed in debugging interfaces that led to the disclosure of memory content. This issue was addressed by sanitizing output from debugging interfaces. CVE-ID CVE-2015-5870 : Apple
Kernel Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to cause a system denial of service Description: A state management issue existed in debugging functionality. This issue was addressed through improved validation. CVE-ID CVE-2015-5902 : Sergi Alvarez (pancake) of NowSecure Research Team
libc Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue existed in the kernel. This issue was addressed through improved memory handling. CVE-ID CVE-2014-8611 : Adrian Chadd and Alfred Perlstein of Norse Corporation
libpthread Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue existed in the kernel. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5899 : Lufeng Li of Qihoo 360 Vulcan Team
libxpc Available for: Mac OS X v10.6.8 and later Impact: Many SSH connections could cause a denial of service Description: launchd had no limit on the number of processes that could be started by a network connection. This issue was addressed by limiting the number of SSH processes to 40. CVE-ID CVE-2015-5881 : Apple
Login Window Available for: Mac OS X v10.6.8 and later Impact: The screen lock may not engage after the specified time period Description: An issue existed with captured display locking. The issue was addressed through improved lock handling. CVE-ID CVE-2015-5833 : Carlos Moreira, Rainer Dorau of rainer dorau informationsdesign, Chris Nehren, Kai Takac, Hans Douma, Toni Vaahtera, and an anonymous researcher
lukemftpd Available for: Mac OS X v10.6.8 and later Impact: A remote attacker may be able to deny service to the FTP server Description: A glob-processing issue existed in tnftpd. This issue was addressed through improved glob validation. CVE-ID CVE-2015-5917 : Maksymilian Arciemowicz of cxsecurity.com
Mail Available for: Mac OS X v10.6.8 and later Impact: Printing an email may leak sensitive user information Description: An issue existed in Mail which bypassed user preferences when printing an email. This issue was addressed through improved user preference enforcement. CVE-ID CVE-2015-5881 : Owen DeLong of Akamai Technologies, Noritaka Kamiya, Dennis Klein from Eschenburg, Germany, Jeff Hammett of Systim Technology Partners
Mail Available for: Mac OS X v10.6.8 and later Impact: An attacker in a privileged network position may be able to intercept attachments of S/MIME-encrypted e-mail sent via Mail Drop Description: An issue existed in handling encryption parameters for large email attachments sent via Mail Drop. The issue is addressed by no longer offering Mail Drop when sending an encrypted e-mail. CVE-ID CVE-2015-5884 : John McCombs of Integrated Mapping Ltd
Multipeer Connectivity Available for: Mac OS X v10.6.8 and later Impact: A local attacker may be able to observe unprotected multipeer data Description: An issue existed in convenience initializer handling in which encryption could be actively downgraded to a non-encrypted session. This issue was addressed by changing the convenience initializer to require encryption. CVE-ID CVE-2015-5851 : Alban Diquet (@nabla_c0d3) of Data Theorem
NetworkExtension Available for: Mac OS X v10.6.8 and later Impact: A malicious application may be able to determine kernel memory layout Description: An uninitialized memory issue in the kernel led to the disclosure of kernel memory content. This issue was addressed through improved memory initialization. CVE-ID CVE-2015-5831 : Maxime Villard of m00nbsd
Notes Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to leak sensitive user information Description: An issue existed in parsing links in the Notes application. This issue was addressed through improved input validation. CVE-ID CVE-2015-5878 : Craig Young of Tripwire VERT, an anonymous researcher
Notes Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to leak sensitive user information Description: A cross-site scripting issue existed in parsing text by the Notes application. This issue was addressed through improved input validation. CVE-ID CVE-2015-5875 : xisigr of Tencent's Xuanwu LAB (www.tencent.com)
OpenSSH Available for: Mac OS X v10.6.8 and later Impact: Multiple vulnerabilities in OpenSSH Description: Multiple vulnerabilities existed in OpenSSH versions prior to 6.9. These issues were addressed by updating OpenSSH to version 6.9. CVE-ID CVE-2014-2532
OpenSSL Available for: Mac OS X v10.6.8 and later Impact: Multiple vulnerabilities in OpenSSL Description: Multiple vulnerabilities existed in OpenSSL versions prior to 0.9.8zg. These were addressed by updating OpenSSL to version 0.9.8zg. CVE-ID CVE-2015-0286 CVE-2015-0287
procmail Available for: Mac OS X v10.6.8 and later Impact: Multiple vulnerabilities in procmail Description: Multiple vulnerabilities existed in procmail versions prior to 3.22. These issues were addressed by removing procmail. CVE-ID CVE-2014-3618
remote_cmds Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to execute arbitrary code with root privileges Description: An issue existed in the usage of environment variables by the rsh binary. This issue was addressed by dropping setuid privileges from the rsh binary. CVE-ID CVE-2015-5889 : Philip Pettersson
removefile Available for: Mac OS X v10.6.8 and later Impact: Processing malicious data may lead to unexpected application termination Description: An overflow fault existed in the checkint division routines. This issue was addressed with improved division routines. CVE-ID CVE-2015-5840 : an anonymous researcher
Ruby Available for: Mac OS X v10.6.8 and later Impact: Multiple vulnerabilities in Ruby Description: Multiple vulnerabilities existed in Ruby versions prior to 2.0.0p645. These were addressed by updating Ruby to version 2.0.0p645. CVE-ID CVE-2014-8080 CVE-2014-8090 CVE-2015-1855
Security Available for: Mac OS X v10.6.8 and later Impact: The lock state of the keychain may be incorrectly displayed to the user Description: A state management issue existed in the way keychain lock status was tracked. This issue was addressed through improved state management. CVE-ID CVE-2015-5915 : Peter Walz of University of Minnesota, David Ephron, Eric E. Lawrence, Apple
Security Available for: Mac OS X v10.6.8 and later Impact: A trust evaluation configured to require revocation checking may succeed even if revocation checking fails Description: The kSecRevocationRequirePositiveResponse flag was specified but not implemented. This issue was addressed by implementing the flag. CVE-ID CVE-2015-5894 : Hannes Oud of kWallet GmbH
Security Available for: Mac OS X v10.6.8 and later Impact: A remote server may prompt for a certificate before identifying itself Description: Secure Transport accepted the CertificateRequest message before the ServerKeyExchange message. This issue was addressed by requiring the ServerKeyExchange first. CVE-ID CVE-2015-5887 : Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Alfredo Pironti, and Jean Karim Zinzindohoue of INRIA Paris-Rocquencourt, and Cedric Fournet and Markulf Kohlweiss of Microsoft Research, Pierre-Yves Strub of IMDEA Software Institute
SMB Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue existed in the kernel. This issue was addressed through improved memory handling. CVE-ID CVE-2015-5891 : Ilja van Sprundel of IOActive
SMB Available for: Mac OS X v10.6.8 and later Impact: A local user may be able to determine kernel memory layout Description: An issue existed in SMBClient that led to the disclosure of kernel memory content. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-5893 : Ilja van Sprundel of IOActive
SQLite Available for: Mac OS X v10.6.8 and later Impact: Multiple vulnerabilities in SQLite v3.8.5 Description: Multiple vulnerabilities existed in SQLite v3.8.5. These issues were addressed by updating SQLite to version 3.8.10.2. CVE-ID CVE-2015-3414 CVE-2015-3415 CVE-2015-3416
Telephony Available for: Mac OS X v10.6.8 and later Impact: A local attacker can place phone calls without the user's knowledge when using Continuity Description: An issue existed in the authorization checks for placing phone calls. This issue was addressed through improved authorization checks. CVE-ID CVE-2015-3785 : Dan Bastone of Gotham Digital Science
Terminal Available for: Mac OS X v10.6.8 and later Impact: Maliciously crafted text could mislead the user in Terminal Description: Terminal did not handle bidirectional override characters in the same way when displaying text and when selecting text. This issue was addressed by suppressing bidirectional override characters in Terminal. CVE-ID CVE-2015-5883 : an anonymous researcher
tidy Available for: Mac OS X v10.6.8 and later Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: Multiple memory corruption issues existed in tidy. These issues were addressed through improved memory handling. CVE-ID CVE-2015-5522 : Fernando Munoz of NULLGroup.com CVE-2015-5523 : Fernando Munoz of NULLGroup.com
Time Machine Available for: Mac OS X v10.6.8 and later Impact: A local attacker may gain access to keychain items Description: An issue existed in backups by the Time Machine framework. This issue was addressed through improved coverage of Time Machine backups. CVE-ID CVE-2015-5854 : Jonas Magazinius of Assured AB
Note: OS X El Capitan 10.11 includes the security content of Safari 9: https://support.apple.com/kb/HT205265.
OS X El Capitan 10.11 may be obtained from the Mac App Store: http://www.apple.com/support/downloads/
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org
iQIcBAEBCAAGBQJWDB2wAAoJEBcWfLTuOo7t0sYP/2L3JOGPkHH8XUh2YHpu5qaw S5F2v+SRpWleKQBVsGZ7oA8PV0rBTzEkzt8K1tNxYmxEqL9f/TpRiGoforn89thO /hOtmVOfUcBjPZ4XKwMVzycfSMC9o6LxWTLEKDVylE+F+5jkXafOC9QaqD11dxX6 QhENkpS1BwrKhyaSVxEcgBQtZM9aTsVdZ78rTCb9XTn6gDnvs8NfIQquFOnaQT54 YJ36e5UcUsnyBIol+yGDbC3ZEhzSVIGE5/8/NFlFfRXLgnJArxD8lqz8WdfU9fop hpT/dDqqAdYbRcW1ihcG1haiNHgP9yQCY5jRNfttb+Tc/kIi/QmPkEO0QS8Ygt/O c3sUbNulr1LCinymFVwx16CM1DplGS/GmBL18BAEBnL6yi9tEhYDynZWLSEa37VR 8q802rXRSF10Wct9/kEeR4HgY/1k0KK/4Uddm3c0YyOU21ya7NAhoHGwmDa9g11r N1TniOK8tPiCGjRNOJwuF6DKxD9L3Fv44bVlxAarGUGYkICqzaNS+bgKI1aQNahT fJ91x5uKD4+L9v9c5slkoDIvWqIhO9oyuxgnmC5GstkwFplFXSOklLkTktjLGNn1 nJq8cPnZ/3E1RXTEwVhGljYw5pdZHNx98XmLomGrPqVlZfjGURK+5AXdf2pOlt2e g6jld/w5tPuCFhGucE7Z =XciV -----END PGP SIGNATURE----- . Good morning! This is kinda long.
== Background ==
If you are not familiar with the original bash function export vulnerability (CVE-2014-6271), you may want to have a look at this article:
http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html
Well, long story short: the initial maintainer-provided patch for this issue [1] (released on September 24) is conclusively broken.
After nagging people to update for a while [5] [7], I wanted to share the technical details of two previously non-public issues which may be used to circumvent the original patch: CVE-2014-6277 and CVE-2014-6278.
Note that the issues discussed here are separate from the three probably less severe problems publicly disclosed earlier on: Tavis' limited-exploitability EOL bug (CVE-2014-7169) and two likely non-exploitable one-off issues found by Florian Weimer and Todd Sabin (CVE-2014-7186 and CVE-2014-7187).
== Required actions ==
If you have installed just the September 24 patch [1], or that and the follow-up September 26 patch for CVE-2014-7169 [2], you are likely still vulnerable to RCE and need to update ASAP, as discussed in [5].
You are safe if you have installed the unofficial function prefix patch from Florian Weimer [3], or its upstream variant released on September 28 [4]. The patch does not eliminate the problems, but shields the underlying parser from untrusted inputs under normal circumstances.
Note: over the past few days, Florian's patch has been picked up by major Linux distros (Red Hat, Debian, SUSE, etc), so there is a reasonable probability that you are in good shape. To test, execute this command from within a bash shell:
foo='() { echo not patched; }' bash -c foo
If you see "not patched", you probably want upgrade immediately. If you see "bash: foo: command not found", you're OK.
== Vulnerability details: CVE-2014-6277 (the more involved one) ==
The following function definition appearing in the value of any environmental variable passed to bash will lead to an attempt to dereference attacker-controlled pointers (provided that the targeted instance of bash is protected only with the original patches [1][2] and does not include Florian's fix):
() { x() { ; }; x() { ; } <<a; }
A more complete example leading to a deref of 0x41414141 would be:
HTTP_COOKIE="() { x() { ; }; x() { ; } <<perl -e '{print
"A"x1000}'
; }" bash -c :
bash[25662]: segfault at 41414141 ip 00190d96 sp bfbe6354 error 4 in libc-2.12.so[110000+191000]
(If you are seeing 0xdfdfdfdf, see note later on).
The issue is caused by an uninitialized here_doc_eof field in a REDIR struct originally created in make_redirection(). The initial segv will happen due to an attempt to read and then copy a string to a new buffer through a macro that expands to:
strcpy (xmalloc (1 + strlen (redirect->here_doc_eof)), (redirect->here_doc_eof))
This appears to be exploitable in at least one way: if here_doc_eof is chosen by the attacker to point in the vicinity of the current stack pointer, the apparent contents of the string - and therefore its length - may change between stack-based calls to xmalloc() and strcpy() as a natural consequence of an attempt to pass parameters and create local variables. Such a mid-macro switch will result in an out-of-bounds write to the newly-allocated memory.
A simple conceptual illustration of this attack vector would be:
-- snip! -- char* result; int len_alloced;
main(int argc, char** argv) {
/ The offset will be system- and compiler-specific /; char* ptr = &ptr - 9;
result = strcpy (malloc(100 + (len_alloced = strlen(ptr))), ptr);
printf("requested memory = %d\n" "copied text = %d\n", len_alloced + 1, strlen(result) + 1);
} -- snip! --
When compiled with the -O2 flag used for bash, on one test system, this produces:
requested memory = 2 copied text = 28
This can lead to heap corruption, with multiple writes possible per payload by simply increasing the number of malformed here-docs. The consequences should be fairly clear.
[ There is also a latter call to free() on here_doc_eof in dispose_cmd.c, but because of the simultaneous discovery of the much simpler bug '78 discussed in the next section, I have not spent a whole lot of time trying to figure out how to get to that path. ]
Perhaps notably, the ability to specify attacker-controlled addresses hinges on the state of --enable-bash-malloc and --enable-mem-scramble compile-time flags; if both are enabled, the memory returned by xmalloc() will be initialized to 0xdf, making the prospect of exploitation more speculative (essentially depending on whether the stack or any other memory region can be grown to overlap with 0xdfdfdfdf). That said, many Linux distributions disable one or both flags and are vulnerable out-of-the-box. It is also of note that relatively few distributions compile bash as PIE, so there is little consolation to be found in ASLR.
Similarly to the original vulnerability, this issue can be usually triggered remotely through web servers such as Apache (provided that they invoke CGI scripts or PHP / Python / Perl / C / Java servlets that rely on system() or popen()-type libcalls); through DHCP clients; and through some MUAs and MTAs. For a more detailed discussion of the exposed attack surface, refer to [6].
== Vulnerability details: CVE-2014-6278 (the "back to the '90s" one) ==
The following function definition appearing in the value of any environmental variable passed to bash 4.2 or 4.3 will lead to straightforward put-your-command-here RCE (again, provided that the targeted instance is not protected with Florian's patch):
() { ; } >[$($())] { echo hi mom; id; }
A complete example looks like this:
HTTP_COOKIE='() { ; } >[$($())] { echo hi mom; id; }' bash -c :
...or:
GET /some/script.cgi HTTP/1.0 User-Agent: () { ; } >[$($())] { id >/tmp/hi_mom; }
Note that the PoC does not work as-is in more ancient versions of bash, such as 2.x or 3.x; it might have been introduced with xparse_dolparen() starting with bash 4.2 patch level 12 few years back, but I have not investigated this in a lot of detail. Florian's patch is strongly recommended either way.
The attack surface through which this flaw may be triggered is roughly similar to that for CVE-2014-6277 and the original bash bug [6].
== Additional info ==
Both of these issues were identified in an automated fashion with american fuzzy lop:
https://code.google.com/p/american-fuzzy-lop
The out-of-the-box fuzzer was seeded with a minimal valid function definition ("() { foo() { foo; }; >bar; }") and allowed to run for a couple of hours on a single core.
In addition to the issues discussed above, the fuzzer also hit three of the four previously-reported CVEs.
I initially shared the findings privately with vendors, but because of the intense scrutiny that this codebase is under, the ease of reproducing these results with an open-source fuzzer, and the now-broad availability of upstream mitigations, there seems to be relatively little value in continued secrecy.
== References ==
[1] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-025 [2] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-026 [3] http://www.openwall.com/lists/oss-security/2014/09/25/13 [4] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027 [5] http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html [6] http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html [7] http://www.pcworld.com/article/2688932/improved-patch-tackles-new-shellshock-attack-vectors.html
PS. There are no other bugs in bash.
--------- FOLLOW UP -----------
Date: Wed, 01 Oct 2014 07:32:57 -0700 From fulldisclosure-bounces@seclists.org Wed Oct 1 14:37:33 2014 From: Paul Vixie paul@redbarn.org To: Michal Zalewski lcamtuf@coredump.cx Cc: "fulldisclosure@seclists.org" fulldisclosure@seclists.org Subject: Re: [FD] the other bash RCEs (CVE-2014-6277 and CVE-2014-6278)
michal, thank you for your incredibly informative report here. i have a minor correction.
Michal Zalewski lcamtuf@coredump.cx Wednesday, October 01, 2014 7:21 AM ...
Note: over the past few days, Florian's patch has been picked up by major Linux distros (Red Hat, Debian, SUSE, etc), so there is a reasonable probability that you are in good shape. To test, execute this command from within a bash shell:
foo='() { echo not patched; }' bash -c foo
this command need not be executed from within bash. the problem occurs when bash is run by the command, and the shell that runs the command can be anything. for example, on a system where i have deliberately not patched bash, where sh is "ash" (almquist shell):
$ foo='() { echo not patched; }' bash -c foo not patched
here's me testing it from within tcsh:
% env foo='() { echo not patched; }' bash -c foo not patched % (setenv foo '() { echo not patched; }'; bash -c foo) not patched
this is a minor issue, but i've found in matters of security bug reports, tests, and discussions, that any minor matter can lead to deep misunderstanding.
thanks again for your excellent report, and your continuing work on this issue.
vixie
.
This vulnerability allows users that have been granted access to a shell script to escalate privilege and execute unrestricted commands at the same security level as the Bash script. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04487558
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04487558 Version: 2
HPSBST03154 rev.2 - HP StoreFabric C-series MDS switches and HP C-series Nexus 5K switches running Bash Shell, Remote Code Execution
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2014-11-06 Last Updated: 2014-12-08
Potential Security Impact: Remote code execution
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP StoreFabric C-series MDS switches and HP C-series Nexus 5K switches running Bash Shell.
References:
CVE-2014-6271 CVE-2014-6277 CVE-2014-6278 CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 Cisco defect id: CSCur01099 (for MDS switches) Cisco defect id: CSCur05017 (for Nexus switches) SSRT101747
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
All HP StoreFabric C-series MDS switches All HP C-series Nexus 5K switches
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-6277 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-6278 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7186 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7187 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP is providing software updates as indicated below to resolve the vulnerability in HP StoreFabric C-series MDS switches. No other firmware stream updates are planned beyond the NX-OS 5.x and 6.x versions listed below for the MDS products.
HP has released and posted the Cisco switch software version NX-OS 6.2(9a) on HP Support Center (HPSC). This software versions 6.2(9a) has included the fixes for the vulnerability in HP StoreFabric C-series MDS switches which currently supporting NX-OS 6.X releases. HP has released and posted the Cisco switch software version NX-OS 5.2(8e) on HP Support Center (HPSC). This software version 5.2(8e) has included the fix for the vulnerability in HP C-series MDS switches which currently supporting NX-OS 5.X releases. HP is continuing to actively work on software updates to resolve the vulnerability in HP C-series Nexus 5k switches. This bulletin will be revised when these updates become available.
MITIGATION INFORMATION
If updating to a NX-OS version containing the fix is not currently possible, HP recommends the following steps to reduce the risk of this vulnerability:
The "ssh" or "telnet" features may be disabled by the admin user. All MDS and Nexus 5K switches can function in this configuration. Access is available through the console port.
HISTORY Version:1 (rev.1) - 6 November 2014 Initial release Version:2 (rev.2) - 8 December 2014 Updated with MDS releases
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux)
iEYEARECAAYFAlSGO3oACgkQ4B86/C0qfVnjRwCgyrfIdMF6zvuUIrKqaSZ+wY3W HGAAoIn6S0g+SNsvUrx7/PWQ59GVlis9 =Wrjt -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201409-0366", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "bash", scope: "eq", trust: 1.3, vendor: "gnu", version: "3.2.48", }, { model: "bash", scope: "eq", trust: 1.3, vendor: "gnu", version: "4.0", }, { model: "bash", scope: "eq", trust: 1.3, vendor: "gnu", version: "3.2", }, { model: "bash", scope: "eq", trust: 1.3, vendor: "gnu", version: "4.2", }, { model: "bash", scope: "eq", trust: 1.3, vendor: "gnu", version: "3.0.16", }, { model: "bash", scope: "eq", trust: 1.3, vendor: "gnu", version: "4.1", }, { model: "bash", scope: "eq", trust: 1.3, vendor: "gnu", version: "3.0", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "1.14.4", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "1.14.3", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "2.03", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "1.14.1", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "2.01", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "1.14.5", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "2.01.1", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "1.14.2", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "4.3", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "1.14.7", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "1.14.6", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "1.14.0", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "2.04", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "3.1", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "2.0", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "2.02", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "2.02.1", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "2.05", }, { model: null, scope: null, trust: 0.8, vendor: "apple", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "avaya", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "barracuda", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "blue coat", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "centos", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "check point", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "cygwin", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "d link", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "debian gnu linux", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "dell computer", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "extreme", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "f5", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "fedora", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "fireeye", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "fortinet", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "gnu bash", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "gentoo linux", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "hewlett packard", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "ibm", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "juniper", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "mageia", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "mcafee", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "monroe", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "nec", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "niksun", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "netapp", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "novell", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "oracle", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "palo alto", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "qnap security", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "red hat", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "suse linux", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "slackware linux", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "sophos", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "trend micro", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "ubuntu", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "vmware", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "xirrus", version: null, }, { model: "bash", scope: "lte", trust: 0.8, vendor: "gnu", version: "4.3 bash43-026", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.1.1", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.2", }, { model: "ip deskphone", scope: "eq", trust: 0.3, vendor: "avaya", version: "96x16.2", }, { model: "colorqube", scope: "eq", trust: 0.3, vendor: "xerox", version: "9302", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.0.4", }, { model: "network analysis module", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "enterprise linux", scope: "eq", trust: 0.3, vendor: "oracle", version: "6.2", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "7228", }, { model: "email gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.0", }, { model: "bash", scope: "eq", trust: 0.3, vendor: "gnu", version: "3.00.0(2)", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "7238", }, { model: "digital media manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.0", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.9", }, { model: "enterprise linux", scope: "eq", trust: 0.3, vendor: "oracle", version: "5", }, { model: "hat enterprise linux long life server", scope: "eq", trust: 0.3, vendor: "red", version: "5.6", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.5.7", }, { model: "email gateway hotfix", scope: "eq", trust: 0.3, vendor: "mcafee", version: "6.7.21", }, { model: "directory pro", scope: "eq", trust: 0.3, vendor: "cosmicperl", version: "10.0.3", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2", }, { model: "emergency responder", scope: "eq", trust: 0.3, vendor: "cisco", version: "1.1", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.1", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.6.4", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.1", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.03", }, { model: "aix", scope: "eq", trust: 0.3, vendor: "ibm", version: "5.3", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.1", }, { model: "linux amd64", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "10.04", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.9", }, { model: "bash", scope: "eq", trust: 0.3, vendor: "gnu", version: "3.1.4", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.8", }, { model: "colorqube", scope: "eq", trust: 0.3, vendor: "xerox", version: "9301", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.1.4", }, { model: "phaser", scope: "eq", trust: 0.3, vendor: "xerox", version: "78000", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.1.3", }, { model: "hat enterprise linux hpc node", scope: "eq", trust: 0.3, vendor: "red", version: "6", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.4", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.2", }, { model: "linux i386", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "10.04", }, { model: "ds8000", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "unified ip phone", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.5.8", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.3", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.0", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.1.5", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.7", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.7.4", }, { model: "ip deskphone", scope: "eq", trust: 0.3, vendor: "avaya", version: "96x16", }, { model: "bash rc1", scope: "eq", trust: 0.3, vendor: "gnu", version: "4.0", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "7232", }, { model: "hat enterprise linux server", scope: "eq", trust: 0.3, vendor: "red", version: "5", }, { model: "vm virtualbox", scope: "eq", trust: 0.3, vendor: "oracle", version: "3.2", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "7242", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.6.3", }, { model: "digital media manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.8", }, { model: "phaser", scope: "eq", trust: 0.3, vendor: "xerox", version: "67000", }, { model: "colorqube", scope: "eq", trust: 0.3, vendor: "xerox", version: "9393", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.5", }, { model: "gss 4492r global site selector", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "enterprise linux", scope: "eq", trust: 0.3, vendor: "oracle", version: "6", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.0.1", }, { model: "linux sparc", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "10.04", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.5.6", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.5.3", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.10", }, { model: "wide area application services", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "colorqube", scope: "eq", trust: 0.3, vendor: "xerox", version: "9303", }, { model: "hat enterprise linux workstation", scope: "eq", trust: 0.3, vendor: "red", version: "6", }, { model: "linux", scope: null, trust: 0.3, vendor: "gentoo", version: null, }, { model: "email gateway hotfix", scope: "eq", trust: 0.3, vendor: "mcafee", version: "6.7.22", }, { model: "linux powerpc", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "10.04", }, { model: "linux lts i386", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "12.04", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.7.2", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.5", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.1.2", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "7235", }, { model: "vm virtualbox", scope: "eq", trust: 0.3, vendor: "oracle", version: "3.1", }, { model: "email gateway patch", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.01", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.5.4", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.5", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.6", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.6", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.6.2", }, { model: "linux arm", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "10.04", }, { model: "linux lts amd64", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "12.04", }, { model: "aix", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.1", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.5.1", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.4", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.6", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.7", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "7245", }, { model: "unified contact center express", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "solaris", scope: "eq", trust: 0.3, vendor: "sun", version: "11", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.0.2", }, { model: "enterprise linux", scope: "eq", trust: 0.3, vendor: "redhat", version: "5.0", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.8", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.6", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.6.1", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.7", }, { model: "show and share", scope: "eq", trust: 0.3, vendor: "cisco", version: "5(2)", }, { model: "mds", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "enterprise linux client", scope: "eq", trust: 0.3, vendor: "redhat", version: "5", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.5.5", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.5", }, { model: "aix", scope: "eq", trust: 0.3, vendor: "ibm", version: "6.1", }, { model: "hat enterprise linux server", scope: "eq", trust: 0.3, vendor: "red", version: "6", }, { model: "linux", scope: "eq", trust: 0.3, vendor: "oracle", version: "5", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.3.4", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.7.3", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.1", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.2.3", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.5.2", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.2", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.3", }, { model: "insight control", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.4.11", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.7.1", }, ], sources: [ { db: "CERT/CC", id: "VU#252743", }, { db: "BID", id: "70165", }, { db: "JVNDB", id: "JVNDB-2014-004431", }, { db: "NVD", id: "CVE-2014-6277", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { cpe_match: [ { cpe22Uri: "cpe:/a:gnu:bash", vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2014-004431", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "HP", sources: [ { db: "PACKETSTORM", id: "128753", }, { db: "PACKETSTORM", id: "130988", }, { db: "PACKETSTORM", id: "128752", }, { db: "PACKETSTORM", id: "128666", }, { db: "PACKETSTORM", id: "129438", }, { db: "PACKETSTORM", id: "128763", }, { db: "PACKETSTORM", id: "128762", }, ], trust: 0.7, }, cve: "CVE-2014-6277", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", exploitabilityScore: 10, id: "CVE-2014-6277", impactScore: 10, integrityImpact: "COMPLETE", severity: "HIGH", trust: 1.9, vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [], severity: [ { author: "nvd@nist.gov", id: "CVE-2014-6277", trust: 1, value: "HIGH", }, { author: "NVD", id: "CVE-2014-6277", trust: 0.8, value: "High", }, { author: "VULMON", id: "CVE-2014-6277", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "VULMON", id: "CVE-2014-6277", }, { db: "JVNDB", id: "JVNDB-2014-004431", }, { db: "NVD", id: "CVE-2014-6277", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169. GNU Bash 4.3 and earlier contains a command injection vulnerability that may allow remote code execution. This vulnerability CVE-2014-6271 and CVE-2014-7169 Vulnerability due to insufficient fix for.Arbitrary code execution or denial of service by a third party through a crafted environment ( Uninitialized memory access and untrusted pointer read and write operations ) There is a possibility of being put into a state. \nAn attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2015-09-30-3 OS X El Capitan 10.11\n\nOS X El Capitan 10.11 is now available and addresses the following:\n\nAddress Book\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local attacker may be able to inject arbitrary code to\nprocesses loading the Address Book framework\nDescription: An issue existed in Address Book framework's handling\nof an environment variable. This issue was addressed through improved\nenvironment variable handling. \nCVE-ID\nCVE-2015-5897 : Dan Bastone of Gotham Digital Science\n\nAirScan\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An attacker with a privileged network position may be able\nto extract payload from eSCL packets sent over a secure connection\nDescription: An issue existed in the processing of eSCL packets. \nThis issue was addressed through improved validation checks. \nCVE-ID\nCVE-2015-5853 : an anonymous researcher\n\napache_mod_php\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Multiple vulnerabilities in PHP\nDescription: Multiple vulnerabilities existed in PHP versions prior\nto 5.5.27, including one which may have led to remote code execution. \nThis issue was addressed by updating PHP to version 5.5.27. \nCVE-ID\nCVE-2014-9425\nCVE-2014-9427\nCVE-2014-9652\nCVE-2014-9705\nCVE-2014-9709\nCVE-2015-0231\nCVE-2015-0232\nCVE-2015-0235\nCVE-2015-0273\nCVE-2015-1351\nCVE-2015-1352\nCVE-2015-2301\nCVE-2015-2305\nCVE-2015-2331\nCVE-2015-2348\nCVE-2015-2783\nCVE-2015-2787\nCVE-2015-3329\nCVE-2015-3330\n\nApple Online Store Kit\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A malicious application may gain access to a user's keychain\nitems\nDescription: An issue existed in validation of access control lists\nfor iCloud keychain items. This issue was addressed through improved\naccess control list checks. \nCVE-ID\nCVE-2015-5836 : XiaoFeng Wang of Indiana University, Luyi Xing of\nIndiana University, Tongxin Li of Peking University, Tongxin Li of\nPeking University, Xiaolong Bai of Tsinghua University\n\nAppleEvents\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A user connected through screen sharing can send Apple\nEvents to a local user's session\nDescription: An issue existed with Apple Event filtering that\nallowed some users to send events to other users. This was addressed\nby improved Apple Event handling. \nCVE-ID\nCVE-2015-5849 : Jack Lawrence (@_jackhl)\n\nAudio\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Playing a malicious audio file may lead to an unexpected\napplication termination\nDescription: A memory corruption issue existed in the handling of\naudio files. This issue issue was addressed through improved memory\nhandling. \nCVE-ID\nCVE-2015-5862 : YoungJin Yoon of Information Security Lab. (Adv.:\nProf. Taekyoung Kwon), Yonsei University, Seoul, Korea\n\nbash\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Multiple vulnerabilities in bash\nDescription: Multiple vulnerabilities existed in bash versions prior\nto 3.2 patch level 57. These issues were addressed by updating bash\nversion 3.2 to patch level 57. \nCVE-ID\nCVE-2014-6277\nCVE-2014-7186\nCVE-2014-7187\n\nCertificate Trust Policy\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Update to the certificate trust policy\nDescription: The certificate trust policy was updated. The complete\nlist of certificates may be viewed at https://support.apple.com/en-\nus/HT202858. \n\nCFNetwork Cookies\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An attacker in a privileged network position can track a\nuser's activity\nDescription: A cross-domain cookie issue existed in the handling of\ntop level domains. The issue was address through improved\nrestrictions of cookie creation. \nCVE-ID\nCVE-2015-5885 : Xiaofeng Zheng of Blue Lotus Team, Tsinghua\nUniversity\n\nCFNetwork FTPProtocol\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Malicious FTP servers may be able to cause the client to\nperform reconnaissance on other hosts\nDescription: An issue existed in the handling of FTP packets when\nusing the PASV command. This issue was resolved through improved\nvalidation. \nCVE-ID\nCVE-2015-5912 : Amit Klein\n\nCFNetwork HTTPProtocol\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A maliciously crafted URL may be able to bypass HSTS and\nleak sensitive data\nDescription: A URL parsing vulnerability existed in HSTS handling. \nThis issue was addressed through improved URL parsing. \nCVE-ID\nCVE-2015-5858 : Xiaofeng Zheng of Blue Lotus Team, Tsinghua\nUniversity\n\nCFNetwork HTTPProtocol\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A malicious website may be able to track users in Safari\nprivate browsing mode\nDescription: An issue existed in the handling of HSTS state in\nSafari private browsing mode. This issue was addressed through\nimproved state handling. \nCVE-ID\nCVE-2015-5860 : Sam Greenhalgh of RadicalResearch Ltd\n\nCFNetwork Proxies\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Connecting to a malicious web proxy may set malicious\ncookies for a website\nDescription: An issue existed in the handling of proxy connect\nresponses. This issue was addressed by removing the set-cookie header\nwhile parsing the connect response. \nCVE-ID\nCVE-2015-5841 : Xiaofeng Zheng of Blue Lotus Team, Tsinghua\nUniversity\n\nCFNetwork SSL\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An attacker with a privileged network position may intercept\nSSL/TLS connections\nDescription: A certificate validation issue existed in NSURL when a\ncertificate changed. This issue was addressed through improved\ncertificate validation. \nCVE-ID\nCVE-2015-5824 : Timothy J. Wood of The Omni Group\n\nCFNetwork SSL\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An attacker may be able to decrypt data protected by SSL\nDescription: There are known attacks on the confidentiality of RC4. \nAn attacker could force the use of RC4, even if the server preferred\nbetter ciphers, by blocking TLS 1.0 and higher connections until\nCFNetwork tried SSL 3.0, which only allows RC4. This issue was\naddressed by removing the fallback to SSL 3.0. \n\nCoreCrypto\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An attacker may be able to determine a private key\nDescription: By observing many signing or decryption attempts, an\nattacker may have been able to determine the RSA private key. This\nissue was addressed using improved encryption algorithms. \n\nCoreText\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: A memory corruption issue existed in the processing of\nfont files. This issue was addressed through improved input\nvalidation. \nCVE-ID\nCVE-2015-5874 : John Villamil (@day6reak), Yahoo Pentest Team\n\nDev Tools\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription: A memory corruption issue existed in dyld. This was\naddressed through improved memory handling. \nCVE-ID\nCVE-2015-5876 : beist of grayhash\n\nDev Tools\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An application may be able to bypass code signing\nDescription: An issue existed with validation of the code signature\nof executables. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2015-5839 : @PanguTeam\n\nDisk Images\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue existed in DiskImages. This\nissue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-5847 : Filippo Bigarella, Luca Todesco\n\ndyld\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An application may be able to bypass code signing\nDescription: An issue existed with validation of the code signature\nof executables. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2015-5839 : TaiG Jailbreak Team\n\nEFI\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A malicious application can prevent some systems from\nbooting\nDescription: An issue existed with the addresses covered by the\nprotected range register. This issue was fixed by changing the\nprotected range. \nCVE-ID\nCVE-2015-5900 : Xeno Kovah & Corey Kallenberg from LegbaCore\n\nEFI\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A malicious Apple Ethernet Thunderbolt adapter may be able\nto affect firmware flashing\nDescription: Apple Ethernet Thunderbolt adapters could modify the\nhost firmware if connected during an EFI update. This issue was\naddressed by not loading option ROMs during updates. \nCVE-ID\nCVE-2015-5914 : Trammell Hudson of Two Sigma Investments and snare\n\nFinder\nAvailable for: Mac OS X v10.6.8 and later\nImpact: The \"Secure Empty Trash\" feature may not securely delete\nfiles placed in the Trash\nDescription: An issue existed in guaranteeing secure deletion of\nTrash files on some systems, such as those with flash storage. This\nissue was addressed by removing the \"Secure Empty Trash\" option. \nCVE-ID\nCVE-2015-5901 : Apple\n\nGame Center\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A malicious Game Center application may be able to access a\nplayer's email address\nDescription: An issue existed in Game Center in the handling of a\nplayer's email. This issue was addressed through improved access\nrestrictions. \nCVE-ID\nCVE-2015-5855 : Nasser Alnasser\n\nHeimdal\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An attacker may be able to replay Kerberos credentials to\nthe SMB server\nDescription: An authentication issue existed in Kerberos\ncredentials. This issue was addressed through additional validation\nof credentials using a list of recently seen credentials. \nCVE-ID\nCVE-2015-5913 : Tarun Chopra of Microsoft Corporation, U.S. and Yu\nFan of Microsoft Corporation, China\n\nICU\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Multiple vulnerabilities in ICU\nDescription: Multiple vulnerabilities existed in ICU versions prior\nto 53.1.0. These issues were addressed by updating ICU to version\n55.1. \nCVE-ID\nCVE-2014-8146\nCVE-2014-8147\nCVE-2015-5922\n\nInstall Framework Legacy\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to gain root privileges\nDescription: A restriction issue existed in the Install private\nframework containing a privileged executable. This issue was\naddressed by removing the executable. \nCVE-ID\nCVE-2015-5888 : Apple\n\nIntel Graphics Driver\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to execute arbitrary code with\nsystem privileges\nDescription: Multiple memory corruption issues existed in the Intel\nGraphics Driver. These issues were addressed through improved memory\nhandling. \nCVE-ID\nCVE-2015-5830 : Yuki MIZUNO (@mzyy94)\nCVE-2015-5877 : Camillus Gerard Cai\n\nIOAudioFamily\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to determine kernel memory layout\nDescription: An issue existed in IOAudioFamily that led to the\ndisclosure of kernel memory content. This issue was addressed by\npermuting kernel pointers. \nCVE-ID\nCVE-2015-5864 : Luca Todesco\n\nIOGraphics\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues existed in the\nkernel. These issues were addressed through improved memory handling. \nCVE-ID\nCVE-2015-5871 : Ilja van Sprundel of IOActive\nCVE-2015-5872 : Ilja van Sprundel of IOActive\nCVE-2015-5873 : Ilja van Sprundel of IOActive\nCVE-2015-5890 : Ilja van Sprundel of IOActive\n\nIOGraphics\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A malicious application may be able to determine kernel\nmemory layout\nDescription: An issue existed in IOGraphics which could have led to\nthe disclosure of kernel memory layout. This issue was addressed\nthrough improved memory management. \nCVE-ID\nCVE-2015-5865 : Luca Todesco\n\nIOHIDFamily\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription: Multiple memory corruption issues existed in\nIOHIDFamily. These issues were addressed through improved memory\nhandling. \nCVE-ID\nCVE-2015-5866 : Apple\nCVE-2015-5867 : moony li of Trend Micro\n\nIOStorageFamily\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local attacker may be able to read kernel memory\nDescription: A memory initialization issue existed in the kernel. \nThis issue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-5863 : Ilja van Sprundel of IOActive\n\nKernel\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: Multiple memory corruption issues existed in the\nKernel. These issues were addressed through improved memory handling. \nCVE-ID\nCVE-2015-5868 : Cererdlong of Alibaba Mobile Security Team\nCVE-2015-5896 : Maxime Villard of m00nbsd\nCVE-2015-5903 : CESG\n\nKernel\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local process can modify other processes without\nentitlement checks\nDescription: An issue existed where root processes using the\nprocessor_set_tasks API were allowed to retrieve the task ports of\nother processes. This issue was addressed through additional\nentitlement checks. \nCVE-ID\nCVE-2015-5882 : Pedro Vilaca, working from original research by\nMing-chieh Pan and Sung-ting Tsai; Jonathan Levin\n\nKernel\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local attacker may control the value of stack cookies\nDescription: Multiple weaknesses existed in the generation of user\nspace stack cookies. These issues were addressed through improved\ngeneration of stack cookies. \nCVE-ID\nCVE-2013-3951 : Stefan Esser\n\nKernel\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An attacker may be able to launch denial of service attacks\non targeted TCP connections without knowing the correct sequence\nnumber\nDescription: An issue existed in xnu's validation of TCP packet\nheaders. This issue was addressed through improved TCP packet header\nvalidation. \nCVE-ID\nCVE-2015-5879 : Jonathan Looney\n\nKernel\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An attacker in a local LAN segment may disable IPv6 routing\nDescription: An insufficient validation issue existed in the\nhandling of IPv6 router advertisements that allowed an attacker to\nset the hop limit to an arbitrary value. This issue was addressed by\nenforcing a minimum hop limit. \nCVE-ID\nCVE-2015-5869 : Dennis Spindel Ljungmark\n\nKernel\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to determine kernel memory layout\nDescription: An issue existed that led to the disclosure of kernel\nmemory layout. This was addressed through improved initialization of\nkernel memory structures. \nCVE-ID\nCVE-2015-5842 : beist of grayhash\n\nKernel\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to determine kernel memory layout\nDescription: An issue existed in debugging interfaces that led to\nthe disclosure of memory content. This issue was addressed by\nsanitizing output from debugging interfaces. \nCVE-ID\nCVE-2015-5870 : Apple\n\nKernel\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to cause a system denial of service\nDescription: A state management issue existed in debugging\nfunctionality. This issue was addressed through improved validation. \nCVE-ID\nCVE-2015-5902 : Sergi Alvarez (pancake) of NowSecure Research Team\n\nlibc\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue existed in the kernel. This\nissue was addressed through improved memory handling. \nCVE-ID\nCVE-2014-8611 : Adrian Chadd and Alfred Perlstein of Norse\nCorporation\n\nlibpthread\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue existed in the kernel. This\nissue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-5899 : Lufeng Li of Qihoo 360 Vulcan Team\n\nlibxpc\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Many SSH connections could cause a denial of service\nDescription: launchd had no limit on the number of processes that\ncould be started by a network connection. This issue was addressed by\nlimiting the number of SSH processes to 40. \nCVE-ID\nCVE-2015-5881 : Apple\n\nLogin Window\nAvailable for: Mac OS X v10.6.8 and later\nImpact: The screen lock may not engage after the specified time\nperiod\nDescription: An issue existed with captured display locking. The\nissue was addressed through improved lock handling. \nCVE-ID\nCVE-2015-5833 : Carlos Moreira, Rainer Dorau of rainer dorau\ninformationsdesign, Chris Nehren, Kai Takac, Hans Douma, Toni\nVaahtera, and an anonymous researcher\n\nlukemftpd\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A remote attacker may be able to deny service to the FTP\nserver\nDescription: A glob-processing issue existed in tnftpd. This issue\nwas addressed through improved glob validation. \nCVE-ID\nCVE-2015-5917 : Maksymilian Arciemowicz of cxsecurity.com\n\nMail\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Printing an email may leak sensitive user information\nDescription: An issue existed in Mail which bypassed user\npreferences when printing an email. This issue was addressed through\nimproved user preference enforcement. \nCVE-ID\nCVE-2015-5881 : Owen DeLong of Akamai Technologies, Noritaka Kamiya,\nDennis Klein from Eschenburg, Germany, Jeff Hammett of Systim\nTechnology Partners\n\nMail\nAvailable for: Mac OS X v10.6.8 and later\nImpact: An attacker in a privileged network position may be able to\nintercept attachments of S/MIME-encrypted e-mail sent via Mail Drop\nDescription: An issue existed in handling encryption parameters for\nlarge email attachments sent via Mail Drop. The issue is addressed by\nno longer offering Mail Drop when sending an encrypted e-mail. \nCVE-ID\nCVE-2015-5884 : John McCombs of Integrated Mapping Ltd\n\nMultipeer Connectivity\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local attacker may be able to observe unprotected\nmultipeer data\nDescription: An issue existed in convenience initializer handling in\nwhich encryption could be actively downgraded to a non-encrypted\nsession. This issue was addressed by changing the convenience\ninitializer to require encryption. \nCVE-ID\nCVE-2015-5851 : Alban Diquet (@nabla_c0d3) of Data Theorem\n\nNetworkExtension\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A malicious application may be able to determine kernel\nmemory layout\nDescription: An uninitialized memory issue in the kernel led to the\ndisclosure of kernel memory content. This issue was addressed through\nimproved memory initialization. \nCVE-ID\nCVE-2015-5831 : Maxime Villard of m00nbsd\n\nNotes\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to leak sensitive user information\nDescription: An issue existed in parsing links in the Notes\napplication. This issue was addressed through improved input\nvalidation. \nCVE-ID\nCVE-2015-5878 : Craig Young of Tripwire VERT, an anonymous researcher\n\nNotes\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to leak sensitive user information\nDescription: A cross-site scripting issue existed in parsing text by\nthe Notes application. This issue was addressed through improved\ninput validation. \nCVE-ID\nCVE-2015-5875 : xisigr of Tencent's Xuanwu LAB (www.tencent.com)\n\nOpenSSH\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Multiple vulnerabilities in OpenSSH\nDescription: Multiple vulnerabilities existed in OpenSSH versions\nprior to 6.9. These issues were addressed by updating OpenSSH to\nversion 6.9. \nCVE-ID\nCVE-2014-2532\n\nOpenSSL\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Multiple vulnerabilities in OpenSSL\nDescription: Multiple vulnerabilities existed in OpenSSL versions\nprior to 0.9.8zg. These were addressed by updating OpenSSL to version\n0.9.8zg. \nCVE-ID\nCVE-2015-0286\nCVE-2015-0287\n\nprocmail\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Multiple vulnerabilities in procmail\nDescription: Multiple vulnerabilities existed in procmail versions\nprior to 3.22. These issues were addressed by removing procmail. \nCVE-ID\nCVE-2014-3618\n\nremote_cmds\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to execute arbitrary code with root\nprivileges\nDescription: An issue existed in the usage of environment variables\nby the rsh binary. This issue was addressed by dropping setuid\nprivileges from the rsh binary. \nCVE-ID\nCVE-2015-5889 : Philip Pettersson\n\nremovefile\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Processing malicious data may lead to unexpected application\ntermination\nDescription: An overflow fault existed in the checkint division\nroutines. This issue was addressed with improved division routines. \nCVE-ID\nCVE-2015-5840 : an anonymous researcher\n\nRuby\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Multiple vulnerabilities in Ruby\nDescription: Multiple vulnerabilities existed in Ruby versions prior\nto 2.0.0p645. These were addressed by updating Ruby to version\n2.0.0p645. \nCVE-ID\nCVE-2014-8080\nCVE-2014-8090\nCVE-2015-1855\n\nSecurity\nAvailable for: Mac OS X v10.6.8 and later\nImpact: The lock state of the keychain may be incorrectly displayed\nto the user\nDescription: A state management issue existed in the way keychain\nlock status was tracked. This issue was addressed through improved\nstate management. \nCVE-ID\nCVE-2015-5915 : Peter Walz of University of Minnesota, David Ephron,\nEric E. Lawrence, Apple\n\nSecurity\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A trust evaluation configured to require revocation checking\nmay succeed even if revocation checking fails\nDescription: The kSecRevocationRequirePositiveResponse flag was\nspecified but not implemented. This issue was addressed by\nimplementing the flag. \nCVE-ID\nCVE-2015-5894 : Hannes Oud of kWallet GmbH\n\nSecurity\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A remote server may prompt for a certificate before\nidentifying itself\nDescription: Secure Transport accepted the CertificateRequest\nmessage before the ServerKeyExchange message. This issue was\naddressed by requiring the ServerKeyExchange first. \nCVE-ID\nCVE-2015-5887 : Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine\nDelignat-Lavaud, Alfredo Pironti, and Jean Karim Zinzindohoue of\nINRIA Paris-Rocquencourt, and Cedric Fournet and Markulf Kohlweiss of\nMicrosoft Research, Pierre-Yves Strub of IMDEA Software Institute\n\nSMB\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue existed in the kernel. This\nissue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-5891 : Ilja van Sprundel of IOActive\n\nSMB\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local user may be able to determine kernel memory layout\nDescription: An issue existed in SMBClient that led to the\ndisclosure of kernel memory content. This issue was addressed through\nimproved bounds checking. \nCVE-ID\nCVE-2015-5893 : Ilja van Sprundel of IOActive\n\nSQLite\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Multiple vulnerabilities in SQLite v3.8.5\nDescription: Multiple vulnerabilities existed in SQLite v3.8.5. \nThese issues were addressed by updating SQLite to version 3.8.10.2. \nCVE-ID\nCVE-2015-3414\nCVE-2015-3415\nCVE-2015-3416\n\nTelephony\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local attacker can place phone calls without the user's\nknowledge when using Continuity\nDescription: An issue existed in the authorization checks for\nplacing phone calls. This issue was addressed through improved\nauthorization checks. \nCVE-ID\nCVE-2015-3785 : Dan Bastone of Gotham Digital Science\n\nTerminal\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Maliciously crafted text could mislead the user in Terminal\nDescription: Terminal did not handle bidirectional override\ncharacters in the same way when displaying text and when selecting\ntext. This issue was addressed by suppressing bidirectional override\ncharacters in Terminal. \nCVE-ID\nCVE-2015-5883 : an anonymous researcher\n\ntidy\nAvailable for: Mac OS X v10.6.8 and later\nImpact: Visiting a maliciously crafted website may lead to arbitrary\ncode execution\nDescription: Multiple memory corruption issues existed in tidy. \nThese issues were addressed through improved memory handling. \nCVE-ID\nCVE-2015-5522 : Fernando Munoz of NULLGroup.com\nCVE-2015-5523 : Fernando Munoz of NULLGroup.com\n\nTime Machine\nAvailable for: Mac OS X v10.6.8 and later\nImpact: A local attacker may gain access to keychain items\nDescription: An issue existed in backups by the Time Machine\nframework. This issue was addressed through improved coverage of Time\nMachine backups. \nCVE-ID\nCVE-2015-5854 : Jonas Magazinius of Assured AB\n\nNote: OS X El Capitan 10.11 includes the security content of\nSafari 9: https://support.apple.com/kb/HT205265. \n\nOS X El Capitan 10.11 may be obtained from the Mac App Store:\nhttp://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple's Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nComment: GPGTools - http://gpgtools.org\n\niQIcBAEBCAAGBQJWDB2wAAoJEBcWfLTuOo7t0sYP/2L3JOGPkHH8XUh2YHpu5qaw\nS5F2v+SRpWleKQBVsGZ7oA8PV0rBTzEkzt8K1tNxYmxEqL9f/TpRiGoforn89thO\n/hOtmVOfUcBjPZ4XKwMVzycfSMC9o6LxWTLEKDVylE+F+5jkXafOC9QaqD11dxX6\nQhENkpS1BwrKhyaSVxEcgBQtZM9aTsVdZ78rTCb9XTn6gDnvs8NfIQquFOnaQT54\nYJ36e5UcUsnyBIol+yGDbC3ZEhzSVIGE5/8/NFlFfRXLgnJArxD8lqz8WdfU9fop\nhpT/dDqqAdYbRcW1ihcG1haiNHgP9yQCY5jRNfttb+Tc/kIi/QmPkEO0QS8Ygt/O\nc3sUbNulr1LCinymFVwx16CM1DplGS/GmBL18BAEBnL6yi9tEhYDynZWLSEa37VR\n8q802rXRSF10Wct9/kEeR4HgY/1k0KK/4Uddm3c0YyOU21ya7NAhoHGwmDa9g11r\nN1TniOK8tPiCGjRNOJwuF6DKxD9L3Fv44bVlxAarGUGYkICqzaNS+bgKI1aQNahT\nfJ91x5uKD4+L9v9c5slkoDIvWqIhO9oyuxgnmC5GstkwFplFXSOklLkTktjLGNn1\nnJq8cPnZ/3E1RXTEwVhGljYw5pdZHNx98XmLomGrPqVlZfjGURK+5AXdf2pOlt2e\ng6jld/w5tPuCFhGucE7Z\n=XciV\n-----END PGP SIGNATURE-----\n. Good morning! This is kinda long. \n\n== Background ==\n\nIf you are not familiar with the original bash function export\nvulnerability (CVE-2014-6271), you may want to have a look at this\narticle:\n\nhttp://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html\n\nWell, long story short: the initial maintainer-provided patch for this\nissue [1] (released on September 24) is *conclusively* broken. \n\nAfter nagging people to update for a while [5] [7], I wanted to share\nthe technical details of two previously non-public issues which may be\nused to circumvent the original patch: CVE-2014-6277 and\nCVE-2014-6278. \n\nNote that the issues discussed here are separate from the three\nprobably less severe problems publicly disclosed earlier on: Tavis'\nlimited-exploitability EOL bug (CVE-2014-7169) and two likely\nnon-exploitable one-off issues found by Florian Weimer and Todd Sabin\n(CVE-2014-7186 and CVE-2014-7187). \n\n== Required actions ==\n\nIf you have installed just the September 24 patch [1], or that and the\nfollow-up September 26 patch for CVE-2014-7169 [2], you are likely\nstill vulnerable to RCE and need to update ASAP, as discussed in [5]. \n\nYou are safe if you have installed the unofficial function prefix\npatch from Florian Weimer [3], or its upstream variant released on\nSeptember 28 [4]. The patch does not eliminate the problems, but\nshields the underlying parser from untrusted inputs under normal\ncircumstances. \n\nNote: over the past few days, Florian's patch has been picked up by\nmajor Linux distros (Red Hat, Debian, SUSE, etc), so there is a\nreasonable probability that you are in good shape. To test, execute\nthis command from within a bash shell:\n\nfoo='() { echo not patched; }' bash -c foo\n\nIf you see \"not patched\", you probably want upgrade immediately. If\nyou see \"bash: foo: command not found\", you're OK. \n\n== Vulnerability details: CVE-2014-6277 (the more involved one) ==\n\nThe following function definition appearing in the value of any\nenvironmental variable passed to bash will lead to an attempt to\ndereference attacker-controlled pointers (provided that the targeted\ninstance of bash is protected only with the original patches [1][2]\nand does not include Florian's fix):\n\n() { x() { _; }; x() { _; } <<a; }\n\nA more complete example leading to a deref of 0x41414141 would be:\n\nHTTP_COOKIE=\"() { x() { _; }; x() { _; } <<`perl -e '{print\n\"A\"x1000}'`; }\" bash -c :\n\nbash[25662]: segfault at 41414141 ip 00190d96 sp bfbe6354 error 4 in\nlibc-2.12.so[110000+191000]\n\n(If you are seeing 0xdfdfdfdf, see note later on). \n\nThe issue is caused by an uninitialized here_doc_eof field in a REDIR\nstruct originally created in make_redirection(). The initial segv will\nhappen due to an attempt to read and then copy a string to a new\nbuffer through a macro that expands to:\n\nstrcpy (xmalloc (1 + strlen (redirect->here_doc_eof)), (redirect->here_doc_eof))\n\nThis appears to be exploitable in at least one way: if here_doc_eof is\nchosen by the attacker to point in the vicinity of the current stack\npointer, the apparent contents of the string - and therefore its\nlength - may change between stack-based calls to xmalloc() and\nstrcpy() as a natural consequence of an attempt to pass parameters and\ncreate local variables. Such a mid-macro switch will result in an\nout-of-bounds write to the newly-allocated memory. \n\nA simple conceptual illustration of this attack vector would be:\n\n-- snip! --\nchar* result;\nint len_alloced;\n\nmain(int argc, char** argv) {\n\n /* The offset will be system- and compiler-specific */;\n char* ptr = &ptr - 9;\n\n result = strcpy (malloc(100 + (len_alloced = strlen(ptr))), ptr);\n\n printf(\"requested memory = %d\\n\"\n \"copied text = %d\\n\", len_alloced + 1, strlen(result) + 1);\n\n}\n-- snip! --\n\nWhen compiled with the -O2 flag used for bash, on one test system,\nthis produces:\n\nrequested memory = 2\ncopied text = 28\n\nThis can lead to heap corruption, with multiple writes possible per\npayload by simply increasing the number of malformed here-docs. The\nconsequences should be fairly clear. \n\n[ There is also a latter call to free() on here_doc_eof in\ndispose_cmd.c, but because of the simultaneous discovery of the much\nsimpler bug '78 discussed in the next section, I have not spent a\nwhole lot of time trying to figure out how to get to that path. ]\n\nPerhaps notably, the ability to specify attacker-controlled addresses\nhinges on the state of --enable-bash-malloc and --enable-mem-scramble\ncompile-time flags; if both are enabled, the memory returned by\nxmalloc() will be initialized to 0xdf, making the prospect of\nexploitation more speculative (essentially depending on whether the\nstack or any other memory region can be grown to overlap with\n0xdfdfdfdf). That said, many Linux distributions disable one or both\nflags and are vulnerable out-of-the-box. It is also of note that\nrelatively few distributions compile bash as PIE, so there is little\nconsolation to be found in ASLR. \n\nSimilarly to the original vulnerability, this issue can be usually\ntriggered remotely through web servers such as Apache (provided that\nthey invoke CGI scripts or PHP / Python / Perl / C / Java servlets\nthat rely on system() or popen()-type libcalls); through DHCP clients;\nand through some MUAs and MTAs. For a more detailed discussion of the\nexposed attack surface, refer to [6]. \n\n== Vulnerability details: CVE-2014-6278 (the \"back to the '90s\" one) ==\n\nThe following function definition appearing in the value of any\nenvironmental variable passed to bash 4.2 or 4.3 will lead to\nstraightforward put-your-command-here RCE (again, provided that the\ntargeted instance is not protected with Florian's patch):\n\n() { _; } >_[$($())] { echo hi mom; id; }\n\nA complete example looks like this:\n\nHTTP_COOKIE='() { _; } >_[$($())] { echo hi mom; id; }' bash -c :\n\n...or:\n\nGET /some/script.cgi HTTP/1.0\nUser-Agent: () { _; } >_[$($())] { id >/tmp/hi_mom; }\n\nNote that the PoC does not work as-is in more ancient versions of\nbash, such as 2.x or 3.x; it might have been introduced with\nxparse_dolparen() starting with bash 4.2 patch level 12 few years\nback, but I have not investigated this in a lot of detail. Florian's\npatch is strongly recommended either way. \n\nThe attack surface through which this flaw may be triggered is roughly\nsimilar to that for CVE-2014-6277 and the original bash bug [6]. \n\n== Additional info ==\n\nBoth of these issues were identified in an automated fashion with\namerican fuzzy lop:\n\nhttps://code.google.com/p/american-fuzzy-lop\n\nThe out-of-the-box fuzzer was seeded with a minimal valid function\ndefinition (\"() { foo() { foo; }; >bar; }\") and allowed to run for a\ncouple of hours on a single core. \n\nIn addition to the issues discussed above, the fuzzer also hit three\nof the four previously-reported CVEs. \n\nI initially shared the findings privately with vendors, but because of\nthe intense scrutiny that this codebase is under, the ease of\nreproducing these results with an open-source fuzzer, and the\nnow-broad availability of upstream mitigations, there seems to be\nrelatively little value in continued secrecy. \n\n== References ==\n\n[1] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-025\n[2] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-026\n[3] http://www.openwall.com/lists/oss-security/2014/09/25/13\n[4] http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027\n[5] http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html\n[6] http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html\n[7] http://www.pcworld.com/article/2688932/improved-patch-tackles-new-shellshock-attack-vectors.html\n\nPS. There are no other bugs in bash. \n\n--------- FOLLOW UP -----------\n\nDate: Wed, 01 Oct 2014 07:32:57 -0700\nFrom fulldisclosure-bounces@seclists.org Wed Oct 1 14:37:33 2014\nFrom: Paul Vixie <paul@redbarn.org>\nTo: Michal Zalewski <lcamtuf@coredump.cx>\nCc: \"fulldisclosure@seclists.org\" <fulldisclosure@seclists.org>\nSubject: Re: [FD] the other bash RCEs (CVE-2014-6277 and CVE-2014-6278)\n\nmichal, thank you for your incredibly informative report here. i have a\nminor correction. \n\n> Michal Zalewski <mailto:lcamtuf@coredump.cx>\n> Wednesday, October 01, 2014 7:21 AM\n> ... \n>\n> Note: over the past few days, Florian's patch has been picked up by\n> major Linux distros (Red Hat, Debian, SUSE, etc), so there is a\n> reasonable probability that you are in good shape. To test, execute\n> this command from within a bash shell:\n>\n> foo='() { echo not patched; }' bash -c foo\n\nthis command need not be executed from within bash. the problem occurs\nwhen bash is run by the command, and the shell that runs the command can\nbe anything. for example, on a system where i have deliberately not\npatched bash, where sh is \"ash\" (almquist shell):\n\n> $ foo='() { echo not patched; }' bash -c foo\n> not patched \n\nhere's me testing it from within tcsh:\n\n> % env foo='() { echo not patched; }' bash -c foo\n> not patched\n> % (setenv foo '() { echo not patched; }'; bash -c foo)\n> not patched\n\nthis is a minor issue, but i've found in matters of security bug\nreports, tests, and discussions, that any minor matter can lead to deep\nmisunderstanding. \n\nthanks again for your excellent report, and your continuing work on this\nissue. \n\nvixie\n\n. \n\nThis vulnerability allows users that have been granted access to a shell\nscript to escalate privilege and execute unrestricted commands at the same\nsecurity level as the Bash script. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04487558\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04487558\nVersion: 2\n\nHPSBST03154 rev.2 - HP StoreFabric C-series MDS switches and HP C-series\nNexus 5K switches running Bash Shell, Remote Code Execution\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2014-11-06\nLast Updated: 2014-12-08\n\nPotential Security Impact: Remote code execution\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with HP StoreFabric\nC-series MDS switches and HP C-series Nexus 5K switches running Bash Shell. \n\nReferences:\n\nCVE-2014-6271\nCVE-2014-6277\nCVE-2014-6278\nCVE-2014-7169\nCVE-2014-7186\nCVE-2014-7187\nCisco defect id: CSCur01099 (for MDS switches)\nCisco defect id: CSCur05017 (for Nexus switches)\nSSRT101747\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\nAll HP StoreFabric C-series MDS switches\nAll HP C-series Nexus 5K switches\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-6277 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-6278 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-7186 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-7187 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP is providing software updates as indicated below to resolve the\nvulnerability in HP StoreFabric C-series MDS switches. No other firmware\nstream updates are planned beyond the NX-OS 5.x and 6.x versions listed below\nfor the MDS products. \n\nHP has released and posted the Cisco switch software version NX-OS 6.2(9a) on\nHP Support Center (HPSC). This software versions 6.2(9a) has included the\nfixes for the vulnerability in HP StoreFabric C-series MDS switches which\ncurrently supporting NX-OS 6.X releases. \nHP has released and posted the Cisco switch software version NX-OS 5.2(8e) on\nHP Support Center (HPSC). This software version 5.2(8e) has included the fix\nfor the vulnerability in HP C-series MDS switches which currently supporting\nNX-OS 5.X releases. \nHP is continuing to actively work on software updates to resolve the\nvulnerability in HP C-series Nexus 5k switches. This bulletin will be revised\nwhen these updates become available. \n\nMITIGATION INFORMATION\n\nIf updating to a NX-OS version containing the fix is not currently possible,\nHP recommends the following steps to reduce the risk of this vulnerability:\n\nThe \"ssh\" or \"telnet\" features may be disabled by the admin user. All MDS and\nNexus 5K switches can function in this configuration. Access is available\nthrough the console port. \n\nHISTORY\nVersion:1 (rev.1) - 6 November 2014 Initial release\nVersion:2 (rev.2) - 8 December 2014 Updated with MDS releases\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.13 (GNU/Linux)\n\niEYEARECAAYFAlSGO3oACgkQ4B86/C0qfVnjRwCgyrfIdMF6zvuUIrKqaSZ+wY3W\nHGAAoIn6S0g+SNsvUrx7/PWQ59GVlis9\n=Wrjt\n-----END PGP SIGNATURE-----\n", sources: [ { db: "NVD", id: "CVE-2014-6277", }, { db: "CERT/CC", id: "VU#252743", }, { db: "JVNDB", id: "JVNDB-2014-004431", }, { db: "BID", id: "70165", }, { db: "VULMON", id: "CVE-2014-6277", }, { db: "PACKETSTORM", id: "128753", }, { db: "PACKETSTORM", id: "130988", }, { db: "PACKETSTORM", id: "128752", }, { db: "PACKETSTORM", id: "133803", }, { db: "PACKETSTORM", id: "128520", }, { db: "PACKETSTORM", id: "128666", }, { db: "PACKETSTORM", id: "129438", }, { db: "PACKETSTORM", id: "128763", }, { db: "PACKETSTORM", id: "128762", }, ], trust: 3.51, }, exploit_availability: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { reference: "https://vulmon.com/exploitdetails?qidtp=exploitdb&qid=35081", trust: 0.3, type: "exploit", }, ], sources: [ { db: "VULMON", id: "CVE-2014-6277", }, ], }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2014-6277", trust: 3.1, }, { db: "JVN", id: "JVN55667175", trust: 1.9, }, { db: "JVNDB", id: "JVNDB-2014-000126", trust: 1.9, }, { db: "CERT/CC", id: "VU#252743", trust: 1.7, }, { db: "SECUNIA", id: "60325", trust: 1.1, }, { db: "SECUNIA", id: "61065", trust: 1.1, }, { db: "SECUNIA", id: "61780", trust: 1.1, }, { db: "SECUNIA", id: "61603", trust: 1.1, }, { db: "SECUNIA", id: "61287", trust: 1.1, }, { db: "SECUNIA", id: "61643", trust: 1.1, }, { db: "SECUNIA", id: "60433", trust: 1.1, }, { db: "SECUNIA", id: "61565", trust: 1.1, }, { db: "SECUNIA", id: "61312", trust: 1.1, }, { db: "SECUNIA", id: "61703", trust: 1.1, }, { db: "SECUNIA", id: "61503", trust: 1.1, }, { db: "SECUNIA", id: "60034", trust: 1.1, }, { db: "SECUNIA", id: "60044", trust: 1.1, }, { db: "SECUNIA", id: "61328", trust: 1.1, }, { db: "SECUNIA", id: "59907", trust: 1.1, }, { db: "SECUNIA", id: "61129", trust: 1.1, }, { db: "SECUNIA", id: "60024", trust: 1.1, }, { db: "SECUNIA", id: "59961", trust: 1.1, }, { db: "SECUNIA", id: "61633", trust: 1.1, }, { db: "SECUNIA", id: "61128", trust: 1.1, }, { db: "SECUNIA", id: "61313", trust: 1.1, }, { db: "SECUNIA", id: "60055", trust: 1.1, }, { db: "SECUNIA", id: "61291", trust: 1.1, }, { db: "SECUNIA", id: "62343", trust: 1.1, }, { db: "SECUNIA", id: "61641", trust: 1.1, }, { db: "SECUNIA", id: "61857", trust: 1.1, }, { db: "SECUNIA", id: "61816", trust: 1.1, }, { db: "SECUNIA", id: "62312", trust: 1.1, }, { db: "SECUNIA", id: "60193", trust: 1.1, }, { db: "SECUNIA", id: "60063", trust: 1.1, }, { db: "SECUNIA", id: "58200", trust: 1.1, }, { db: "SECUNIA", id: "61654", trust: 1.1, }, { db: "SECUNIA", id: "61550", trust: 1.1, }, { db: "SECUNIA", id: "61283", trust: 1.1, }, { db: "SECUNIA", id: "61485", trust: 1.1, }, { db: "SECUNIA", id: "61471", trust: 1.1, }, { db: "SECUNIA", id: "61442", trust: 1.1, }, { db: "SECUNIA", id: "61552", trust: 1.1, }, { db: "MCAFEE", id: "SB10085", trust: 1.1, }, { db: "PACKETSTORM", id: "128567", trust: 1.1, }, { db: "JUNIPER", id: "JSA10648", trust: 1.1, }, { db: "JVN", id: "JVNVU97219505", trust: 0.8, }, { db: "JVN", id: "JVNVU96447236", trust: 0.8, }, { db: "JVN", id: "JVNVU97220341", trust: 0.8, }, { db: "USCERT", id: "TA14-268A", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2014-004431", trust: 0.8, }, { db: "BID", id: "70165", trust: 0.3, }, { db: "EXPLOIT-DB", id: "35081", trust: 0.1, }, { db: "VULMON", id: "CVE-2014-6277", trust: 0.1, }, { db: "PACKETSTORM", id: "128753", trust: 0.1, }, { db: "PACKETSTORM", id: "130988", trust: 0.1, }, { db: "PACKETSTORM", id: "128752", trust: 0.1, }, { db: "PACKETSTORM", id: "133803", trust: 0.1, }, { db: "OPENWALL", id: "OSS-SECURITY/2014/09/25/13", trust: 0.1, }, { db: "PACKETSTORM", id: "128520", trust: 0.1, }, { db: "PACKETSTORM", id: "128666", trust: 0.1, }, { db: "PACKETSTORM", id: "129438", trust: 0.1, }, { db: "PACKETSTORM", id: "128763", trust: 0.1, }, { db: "PACKETSTORM", id: "128762", trust: 0.1, }, ], sources: [ { db: "CERT/CC", id: "VU#252743", }, { db: "VULMON", id: "CVE-2014-6277", }, { db: "BID", id: "70165", }, { db: "JVNDB", id: "JVNDB-2014-004431", }, { db: "PACKETSTORM", id: "128753", }, { db: "PACKETSTORM", id: "130988", }, { db: "PACKETSTORM", id: "128752", }, { db: "PACKETSTORM", id: "133803", }, { db: "PACKETSTORM", id: "128520", }, { db: "PACKETSTORM", id: "128666", }, { db: "PACKETSTORM", id: "129438", }, { db: "PACKETSTORM", id: "128763", }, { db: "PACKETSTORM", id: "128762", }, { db: "NVD", id: "CVE-2014-6277", }, ], }, id: "VAR-201409-0366", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.3212341, }, last_update_date: "2024-11-25T20:36:23.589000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "APPLE-SA-2015-01-27-4", trust: 0.8, url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { title: "APPLE-SA-2015-09-30-3 OS X El Capitan 10.11", trust: 0.8, url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { title: "HT205267", trust: 0.8, url: "https://support.apple.com/en-us/HT205267", }, { title: "HT204244", trust: 0.8, url: "http://support.apple.com/en-us/HT204244", }, { title: "HT204244", trust: 0.8, url: "http://support.apple.com/ja-jp/HT204244", }, { title: "HT205267", trust: 0.8, url: "http://support.apple.com/ja-jp/HT205267", }, { title: "bash-3.2-33.AXS3.4 ", trust: 0.8, url: "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=3918", }, { title: "bash-4.1.2-15.AXS4.2 ", trust: 0.8, url: "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=3919", }, { title: "cisco-sa-20140926-bash", trust: 0.8, url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { title: "CTX200223", trust: 0.8, url: "https://support.citrix.com/article/CTX200223", }, { title: "CTX200217", trust: 0.8, url: "https://support.citrix.com/article/CTX200217", }, { title: "GNU Bash", trust: 0.8, url: "http://www.gnu.org/software/bash/", }, { title: "HPSBMU03143 SSRT101761", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04479536", }, { title: "HPSBMU03246 SSRT101743", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04558068", }, { title: "HPSBMU03182 SSRT101787", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04497042", }, { title: "HPSBST03122 SSRT101717", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04471532", }, { title: "HPSBMU03144 SSRT101762", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04479492", }, { title: "HPSBST03154 SSRT101747", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04487558", }, { title: "HPSBHF03125 SSRT101724", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04471538", }, { title: "HPSBST03129 SSRT101760", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04478866", }, { title: "HPSBST03181 SSRT101811", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04496383", }, { title: "HPSBGN03233", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04540692", }, { title: "HPSBGN03138 SSRT101755", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04475942", }, { title: "HPSBGN03142 SSRT101764", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04479402", }, { title: "HPSBST03155 SSRT101747", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04487573", }, { title: "HPSBMU03217 SSRT101827", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04512907", }, { title: "HPSBGN03141 SSRT101763", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04479398", }, { title: "HPSBMU03165 SSRT101783", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04497075", }, { title: "HPSBMU03220 SSRT101819", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04518183", }, { title: "HPSBHF03146 SSRT101765", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04479601", }, { title: "HPSBST03157 SSRT101718", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04488200", }, { title: "HPSBMU03236 SSRT101830", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04552143", }, { title: "HPSBHF03145 SSRT101765", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04479505", }, { title: "HPSBMU03245 SSRT101742", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c04556845", }, { title: "1685604", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { title: "1685541", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { title: "1685914", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { title: "S1004915", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { title: "1685733", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { title: "1685749", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { title: "1686131", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { title: "T1021279", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { title: "MIGR-5096315", trust: 0.8, url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { title: "S1004897", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { title: "1685433", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685433", }, { title: "T1021272", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { title: "S1004898", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { title: "1685522", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685522", }, { title: "S1004879", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, { title: "1686479", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { title: "1686493", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686493", }, { title: "1686299", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686299", }, { title: "1686635", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686635", }, { title: "1685798", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685798", }, { title: "アライドテレシス株式会社からの情報", trust: 0.8, url: "http://jvn.jp/vu/JVNVU97219505/522154/index.html", }, { title: "OES11 SP2, OES11SP1, OES2 SP3 vulnerability with GNU Bash Remote Code Execution (aka ShellShock) and Mozilla NSS vulnerabilities", trust: 0.8, url: "http://www.novell.com/support/kb/doc.php?id=7015701", }, { title: "ZENworks Configuration Management vulnerability with GNU Bash Remote Code Execution (aka ShellShock)", trust: 0.8, url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { title: "AV14-003", trust: 0.8, url: "http://jpn.nec.com/security-info/av14-003.html", }, { title: "ShellShock 101 - What you need to know and do, to ensure your systems are secure", trust: 0.8, url: "https://www.suse.com/support/shellshock/", }, { title: "ELSA-2014-3093", trust: 0.8, url: "http://linux.oracle.com/errata/ELSA-2014-3093", }, { title: "ELSA-2014-3094", trust: 0.8, url: "http://linux.oracle.com/errata/ELSA-2014-3094", }, { title: "Bash \"Shellshock\" Vulnerabilities - CVE-2014-7169", trust: 0.8, url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { title: "NAS-201410-05", trust: 0.8, url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { title: "Bug 1141597", trust: 0.8, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1141597", }, { title: "Resolution for Bash Code Injection Vulnerability via Specially Crafted Environment Variables (CVE-2014-6271, CVE-2014-7169) in Red Hat Enterprise Linux", trust: 0.8, url: "https://access.redhat.com/solutions/1207723", }, { title: "Bash specially-crafted environment variables code injection attack", trust: 0.8, url: "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/", }, { title: "GNU Bash 「OS コマンドインジェクション」の脆弱性について ", trust: 0.8, url: "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU252743.html", }, { title: "SA82", trust: 0.8, url: "https://bto.bluecoat.com/security-advisory/sa82", }, { title: "SOL15629", trust: 0.8, url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { title: "Multiple vulnerabilities in Bash", trust: 0.8, url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_bash", }, { title: "JSA10648", trust: 0.8, url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { title: "VMSA-2014-0010", trust: 0.8, url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { title: "GNU bash の脆弱性に関する弊社調査・対応状況について", trust: 0.8, url: "http://www.iodata.jp/support/information/2014/bash/", }, { title: "bashの脆弱性(CVE-2014-6271,CVE-2014-7169 他)によるHA8500への影響について", trust: 0.8, url: "http://www.hitachi.co.jp/products/it/server/security/info/vulnerable/bash_ha8500.html", }, { title: "サーバ・クライアント製品 bashの脆弱性(CVE-2014-6271,CVE-2014-7169他)による影響について", trust: 0.8, url: "http://www.hitachi.co.jp/products/it/server/security/info/vulnerable/bash_cve20146271.html", }, { title: "cisco-sa-20140926-bash", trust: 0.8, url: "http://www.cisco.com/cisco/web/support/JP/112/1126/1126247_cisco-sa-20140926-bash-j.html", }, { title: "GNU BashにおけるOSコマンドインジェクションの脆弱性", trust: 0.8, url: "http://buffalo.jp/support_s/s20141002.html", }, { title: "TLSA-2014-10", trust: 0.8, url: "http://www.turbolinux.co.jp/security/2014/TLSA-2014-10j.html", }, { title: "GNU Bash に OS コマンドインジェクションの脆弱性", trust: 0.8, url: "http://software.fujitsu.com/jp/security/vulnerabilities/jvn-97219505.html", }, { title: "Arch Linux Issues: ", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2014-6277", }, { title: "Ubuntu Security Notice: bash vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2380-1", }, { title: "VMware Security Advisories: VMware product updates address critical Bash security vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories&qid=86cb6b3955e100fdc9667a7ca916c772", }, { title: "Symantec Security Advisories: SA82 : GNU Bash Shellshock Command Injection Vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=2b57ceaadfde2a8b03482273e1fd21ea", }, { title: "Apple: OS X Yosemite v10.10.2 and Security Update 2015-001", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=64cbe709a7be49c91d8a8b0f43621640", }, { title: "Tenable Security Advisories: [R7] Tenable Appliance Affected by GNU bash 'Shellshock' Vulnerability", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=TNS-2014-07", }, { title: "Citrix Security Bulletins: Citrix XenServer Shellshock Security Update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=64ae0aae8269062686789e3a3fa1d2bf", }, { title: "Citrix Security Bulletins: Citrix Security Advisory for GNU Bash Shellshock Vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=73443a6db89dc66fc6bcb49f85bfd1ab", }, { title: "Apple: OS X El Capitan v10.11", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=e88bab658248444f5dffc23fd95859e7", }, { title: "patch-bash-shellshock", trust: 0.1, url: "https://github.com/jdauphant/patch-bash-shellshock ", }, { title: "macosx-bash-92-shellshock-patched", trust: 0.1, url: "https://github.com/ido/macosx-bash-92-shellshock-patched ", }, { title: "w-test", trust: 0.1, url: "https://github.com/inspirion87/w-test ", }, { title: "shellshockFixOSX", trust: 0.1, url: "https://github.com/opragel/shellshockFixOSX ", }, { title: "shocktrooper", trust: 0.1, url: "https://github.com/EvanK/shocktrooper ", }, { title: "ShellShockHunter", trust: 0.1, url: "https://github.com/MrCl0wnLab/ShellShockHunter ", }, { title: "Xpl-SHELLSHOCK-Ch3ck", trust: 0.1, url: "https://github.com/googleinurl/Xpl-SHELLSHOCK-Ch3ck ", }, { title: "bashcheck", trust: 0.1, url: "https://github.com/hannob/bashcheck ", }, { title: "shellshocker-pocs", trust: 0.1, url: "https://github.com/mubix/shellshocker-pocs ", }, { title: "LinuxFlaw", trust: 0.1, url: "https://github.com/mudongliang/LinuxFlaw ", }, { title: "afl-cve", trust: 0.1, url: "https://github.com/mrash/afl-cve ", }, { title: "Threatpost", trust: 0.1, url: "https://threatpost.com/researcher-takes-wraps-off-two-undisclosed-shellshock-vulnerabilities-in-bash/108674/", }, ], sources: [ { db: "VULMON", id: "CVE-2014-6277", }, { db: "JVNDB", id: "JVNDB-2014-004431", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-78", trust: 1.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2014-004431", }, { db: "NVD", id: "CVE-2014-6277", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2, url: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", }, { trust: 1.9, url: "https://kb.bluecoat.com/index?page=content&id=sa82", }, { trust: 1.9, url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140926-bash", }, { trust: 1.9, url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { trust: 1.9, url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10085", }, { trust: 1.9, url: "http://jvndb.jvn.jp/jvndb/jvndb-2014-000126", }, { trust: 1.6, url: "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/", }, { trust: 1.1, url: "https://www.suse.com/support/shellshock/", }, { trust: 1.1, url: "http://support.novell.com/security/cve/cve-2014-6277.html", }, { trust: 1.1, url: "http://secunia.com/advisories/61641", }, { trust: 1.1, url: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", }, { trust: 1.1, url: "http://secunia.com/advisories/61485", }, { trust: 1.1, url: "http://secunia.com/advisories/59907", }, { trust: 1.1, url: "http://www.ubuntu.com/usn/usn-2380-1", }, { trust: 1.1, url: "http://secunia.com/advisories/61654", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { trust: 1.1, url: "http://packetstormsecurity.com/files/128567/ca-technologies-gnu-bash-shellshock.html", }, { trust: 1.1, url: "http://secunia.com/advisories/61565", }, { trust: 1.1, url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { trust: 1.1, url: "http://www.vmware.com/security/advisories/vmsa-2014-0010.html", }, { trust: 1.1, url: "http://secunia.com/advisories/61643", }, { trust: 1.1, url: "http://secunia.com/advisories/61503", }, { trust: 1.1, url: "https://kb.juniper.net/infocenter/index?page=content&id=jsa10648", }, { trust: 1.1, url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { trust: 1.1, url: "http://secunia.com/advisories/61633", }, { trust: 1.1, url: "http://secunia.com/advisories/61552", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { trust: 1.1, url: "http://secunia.com/advisories/61703", }, { trust: 1.1, url: "http://secunia.com/advisories/61283", }, { trust: 1.1, url: "http://secunia.com/advisories/61603", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021272", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { trust: 1.1, url: "https://support.citrix.com/article/ctx200217", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004879", }, { trust: 1.1, url: "http://secunia.com/advisories/60034", }, { trust: 1.1, url: "http://secunia.com/advisories/61816", }, { trust: 1.1, url: "http://secunia.com/advisories/61128", }, { trust: 1.1, url: "http://secunia.com/advisories/61313", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004898", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { trust: 1.1, url: "http://secunia.com/advisories/61442", }, { trust: 1.1, url: "http://secunia.com/advisories/61287", }, { trust: 1.1, url: "https://support.citrix.com/article/ctx200223", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021279", }, { trust: 1.1, url: "http://secunia.com/advisories/60055", }, { trust: 1.1, url: "http://secunia.com/advisories/61129", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004897", }, { trust: 1.1, url: "http://secunia.com/advisories/61780", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { trust: 1.1, url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096315", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { trust: 1.1, url: "http://secunia.com/advisories/61471", }, { trust: 1.1, url: "http://secunia.com/advisories/61328", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004915", }, { trust: 1.1, url: "http://secunia.com/advisories/58200", }, { trust: 1.1, url: "http://secunia.com/advisories/61857", }, { trust: 1.1, url: "http://secunia.com/advisories/60193", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { trust: 1.1, url: "http://secunia.com/advisories/61065", }, { trust: 1.1, url: "http://secunia.com/advisories/61550", }, { trust: 1.1, url: "http://secunia.com/advisories/60325", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { trust: 1.1, url: "http://secunia.com/advisories/61312", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { trust: 1.1, url: "http://secunia.com/advisories/60063", }, { trust: 1.1, url: "http://secunia.com/advisories/61291", }, { trust: 1.1, url: "http://secunia.com/advisories/60044", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { trust: 1.1, url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk102673&src=securityalerts", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021361", }, { trust: 1.1, url: "http://secunia.com/advisories/60433", }, { trust: 1.1, url: "http://secunia.com/advisories/60024", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { trust: 1.1, url: "http://jvn.jp/en/jp/jvn55667175/index.html", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { trust: 1.1, url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { trust: 1.1, url: "http://secunia.com/advisories/62312", }, { trust: 1.1, url: "http://secunia.com/advisories/59961", }, { trust: 1.1, url: "http://secunia.com/advisories/62343", }, { trust: 1.1, url: "http://linux.oracle.com/errata/elsa-2014-3093", }, { trust: 1.1, url: "http://linux.oracle.com/errata/elsa-2014-3094", }, { trust: 1.1, url: "http://lists.apple.com/archives/security-announce/2015/jan/msg00003.html", }, { trust: 1.1, url: "http://support.apple.com/ht204244", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { trust: 1.1, url: "http://www.mandriva.com/security/advisories?name=mdvsa-2015:164", }, { trust: 1.1, url: "http://lists.apple.com/archives/security-announce/2015/sep/msg00008.html", }, { trust: 1.1, url: "https://support.apple.com/ht205267", }, { trust: 1.1, url: "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c04518183", }, { trust: 1.1, url: "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c04497075", }, { trust: 0.9, url: "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html", }, { trust: 0.9, url: "http://www.kb.cert.org/vuls/id/252743", }, { trust: 0.9, url: "https://nvd.nist.gov/vuln/detail/cve-2014-6277", }, { trust: 0.8, url: "http://seclists.org/oss-sec/2014/q3/650", }, { trust: 0.8, url: "https://access.redhat.com/articles/1200223", }, { trust: 0.8, url: "http://seclists.org/oss-sec/2014/q3/688", }, { trust: 0.8, url: "http://seclists.org/oss-sec/2014/q3/685", }, { trust: 0.8, url: "https://gist.github.com/anonymous/929d622f3b36b00c0be1", }, { trust: 0.8, url: "https://www.dfranke.us/posts/2014-09-27-shell-shock-exploitation-vectors.html", }, { trust: 0.8, url: "https://shellshocker.net/#", }, { trust: 0.8, url: "http://support.apple.com/kb/ht6495", }, { trust: 0.8, url: "https://www.barracuda.com/support/techalerts", }, { trust: 0.8, url: "http://www.checkpoint.com/blog/protecting-shellshock/index.html", }, { trust: 0.8, url: "http://securityadvisories.dlink.com/security/publication.aspx?name=sap10044", }, { trust: 0.8, url: "https://www.debian.org/security/2014/dsa-3032", }, { trust: 0.8, url: "http://learn.extremenetworks.com/rs/extreme/images/vn-2014-001-%20gnu%20bash%20threats%20-cve-2014-7169%20rev01.pdf", }, { trust: 0.8, url: "http://fedoramagazine.org/shellshock-update-bash-packages-that-resolve-cve-2014-6271-and-cve-2014-7169-available/", }, { trust: 0.8, url: "http://www.fortiguard.com/advisory/fg-ir-14-030/", }, { trust: 0.8, url: "http://www.gentoo.org/security/en/glsa/glsa-201409-09.xml", }, { trust: 0.8, url: "http://alerts.hp.com/r?2.1.3kt.2zr.15ee22.l8mgqe..n.ghvs.8f9a.bw89mq%5f%5fdbosfqk0", }, { trust: 0.8, url: "http://kb.juniper.net/jsa10648", }, { trust: 0.8, url: "http://jpn.nec.com/security-info/av14-003.html", }, { trust: 0.8, url: "http://support.novell.com/security/cve/cve-2014-6271.html", }, { trust: 0.8, url: "https://www.suse.com/support/kb/doc.php?id=7015702", }, { trust: 0.8, url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.522193", }, { trust: 0.8, url: "http://www.ubuntu.com/usn/usn-2362-1/", }, { trust: 0.8, url: "http://kb.vmware.com/selfservice/microsites/search.do?language=en_us&cmd=displaykc&externalid=2090740", }, { trust: 0.8, url: "http://pkgsrc.se/files.php?messageid=20140925202832.9ad9c98@cvs.netbsd.org", }, { trust: 0.8, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-6277", }, { trust: 0.8, url: "http://www.ipa.go.jp/security/ciadr/vul/20140926-bash.html", }, { trust: 0.8, url: "https://www.jpcert.or.jp/at/2014/at140037.html", }, { trust: 0.8, url: "http://jvn.jp/jp/jvn55667175/index.html", }, { trust: 0.8, url: "http://jvn.jp/vu/jvnvu96447236/index.html", }, { trust: 0.8, url: "http://jvn.jp/vu/jvnvu97219505/index.html", }, { trust: 0.8, url: "http://jvn.jp/vu/jvnvu97220341/index.html", }, { trust: 0.8, url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-6277", }, { trust: 0.8, url: "https://www.us-cert.gov/ncas/alerts/ta14-268a", }, { trust: 0.8, url: "http://lcamtuf.blogspot.jp/2014/09/bash-bug-apply-unofficial-patch-now.html", }, { trust: 0.8, url: "http://www.aratana.jp/security/detail.php?id=10", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2014-7186", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2014-6271", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2014-7187", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2014-6278", }, { trust: 0.7, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/", }, { trust: 0.7, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/", }, { trust: 0.7, url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins", }, { trust: 0.7, url: "https://nvd.nist.gov/vuln/detail/cve-2014-7169", }, { trust: 0.3, url: "http://www.gnu.org/software/bash/", }, { trust: 0.3, url: "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/78.html", }, { trust: 0.1, url: "https://www.exploit-db.com/exploits/35081/", }, { trust: 0.1, url: "https://security.archlinux.org/cve-2014-6277", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://usn.ubuntu.com/2380-1/", }, { trust: 0.1, url: "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2104-6277", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2104-6278", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-0287", }, { trust: 0.1, url: "https://support.apple.com/kb/ht201222", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-0235", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-8146", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-0231", }, { trust: 0.1, url: "http://www.apple.com/support/downloads/", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-8080", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-2331", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-1351", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-8090", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-9705", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-1352", }, { trust: 0.1, url: "https://support.apple.com/en-", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2013-3951", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-8147", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-0232", }, { trust: 0.1, url: "https://www.apple.com/support/security/pgp/", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-2301", }, { trust: 0.1, url: "https://support.apple.com/kb/ht205265.", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-8611", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-9427", }, { trust: 0.1, url: "http://gpgtools.org", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-1855", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-2305", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-9425", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-3618", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-9709", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-0273", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-2532", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-9652", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2015-0286", }, { trust: 0.1, url: "https://www.tencent.com)", }, { trust: 0.1, url: "http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-026", }, { trust: 0.1, url: "http://www.pcworld.com/article/2688932/improved-patch-tackles-new-shellshock-attack-vectors.html", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-6279", }, { trust: 0.1, url: "https://code.google.com/p/american-fuzzy-lop", }, { trust: 0.1, url: "http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027", }, { trust: 0.1, url: "http://www.openwall.com/lists/oss-security/2014/09/25/13", }, { trust: 0.1, url: "http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-025", }, { trust: 0.1, url: "http://support.openview.hp.com/selfsolve/document/km01194258", }, { trust: 0.1, url: "http://support.openview.hp.com/selfsolve/document/km01194259", }, ], sources: [ { db: "CERT/CC", id: "VU#252743", }, { db: "VULMON", id: "CVE-2014-6277", }, { db: "BID", id: "70165", }, { db: "JVNDB", id: "JVNDB-2014-004431", }, { db: "PACKETSTORM", id: "128753", }, { db: "PACKETSTORM", id: "130988", }, { db: "PACKETSTORM", id: "128752", }, { db: "PACKETSTORM", id: "133803", }, { db: "PACKETSTORM", id: "128520", }, { db: "PACKETSTORM", id: "128666", }, { db: "PACKETSTORM", id: "129438", }, { db: "PACKETSTORM", id: "128763", }, { db: "PACKETSTORM", id: "128762", }, { db: "NVD", id: "CVE-2014-6277", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CERT/CC", id: "VU#252743", }, { db: "VULMON", id: "CVE-2014-6277", }, { db: "BID", id: "70165", }, { db: "JVNDB", id: "JVNDB-2014-004431", }, { db: "PACKETSTORM", id: "128753", }, { db: "PACKETSTORM", id: "130988", }, { db: "PACKETSTORM", id: "128752", }, { db: "PACKETSTORM", id: "133803", }, { db: "PACKETSTORM", id: "128520", }, { db: "PACKETSTORM", id: "128666", }, { db: "PACKETSTORM", id: "129438", }, { db: "PACKETSTORM", id: "128763", }, { db: "PACKETSTORM", id: "128762", }, { db: "NVD", id: "CVE-2014-6277", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2014-09-25T00:00:00", db: "CERT/CC", id: "VU#252743", }, { date: "2014-09-27T00:00:00", db: "VULMON", id: "CVE-2014-6277", }, { date: "2014-09-27T00:00:00", db: "BID", id: "70165", }, { date: "2014-09-30T00:00:00", db: "JVNDB", id: "JVNDB-2014-004431", }, { date: "2014-10-20T13:55:00", db: "PACKETSTORM", id: "128753", }, { date: "2015-03-24T17:07:02", db: "PACKETSTORM", id: "130988", }, { date: "2014-10-20T13:14:00", db: "PACKETSTORM", id: "128752", }, { date: "2015-10-01T16:33:47", db: "PACKETSTORM", id: "133803", }, { date: "2014-10-01T23:55:55", db: "PACKETSTORM", id: "128520", }, { date: "2014-10-14T23:07:16", db: "PACKETSTORM", id: "128666", }, { date: "2014-12-09T23:15:30", db: "PACKETSTORM", id: "129438", }, { date: "2014-10-20T17:55:00", db: "PACKETSTORM", id: "128763", }, { date: "2014-10-20T17:44:00", db: "PACKETSTORM", id: "128762", }, { date: "2014-09-27T22:55:02.660000", db: "NVD", id: "CVE-2014-6277", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2015-04-14T00:00:00", db: "CERT/CC", id: "VU#252743", }, { date: "2018-08-09T00:00:00", db: "VULMON", id: "CVE-2014-6277", }, { date: "2015-10-26T16:51:00", db: "BID", id: "70165", }, { date: "2015-12-24T00:00:00", db: "JVNDB", id: "JVNDB-2014-004431", }, { date: "2024-11-21T02:14:04.890000", db: "NVD", id: "CVE-2014-6277", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "network", sources: [ { db: "BID", id: "70165", }, ], trust: 0.3, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "GNU Bash shell executes commands in exported functions in environment variables", sources: [ { db: "CERT/CC", id: "VU#252743", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Design Error", sources: [ { db: "BID", id: "70165", }, ], trust: 0.3, }, }
ghsa-55cc-h8m2-x3mp
Vulnerability from github
GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.
{ affected: [], aliases: [ "CVE-2014-6277", ], database_specific: { cwe_ids: [ "CWE-78", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2014-09-27T22:55:00Z", severity: "HIGH", }, details: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", id: "GHSA-55cc-h8m2-x3mp", modified: "2022-05-14T03:09:06Z", published: "2022-05-14T03:09:06Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-6277", }, { type: "WEB", url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { type: "WEB", url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { type: "WEB", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { type: "WEB", url: "https://support.apple.com/HT205267", }, { type: "WEB", url: "https://support.citrix.com/article/CTX200217", }, { type: "WEB", url: "https://support.citrix.com/article/CTX200223", }, { type: "WEB", url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { type: "WEB", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { type: "WEB", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { type: "WEB", url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { type: "WEB", url: "https://www.suse.com/support/shellshock", }, { type: "WEB", url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { type: "WEB", url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { type: "WEB", url: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", }, { type: "WEB", url: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", }, { type: "WEB", url: "http://linux.oracle.com/errata/ELSA-2014-3093", }, { type: "WEB", url: "http://linux.oracle.com/errata/ELSA-2014-3094", }, { type: "WEB", url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { type: "WEB", url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { type: "WEB", url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { type: "WEB", url: "http://secunia.com/advisories/58200", }, { type: "WEB", url: "http://secunia.com/advisories/59907", }, { type: "WEB", url: "http://secunia.com/advisories/59961", }, { type: "WEB", url: "http://secunia.com/advisories/60024", }, { type: "WEB", url: "http://secunia.com/advisories/60034", }, { type: "WEB", url: "http://secunia.com/advisories/60044", }, { type: "WEB", url: "http://secunia.com/advisories/60055", }, { type: "WEB", url: "http://secunia.com/advisories/60063", }, { type: "WEB", url: "http://secunia.com/advisories/60193", }, { type: "WEB", url: "http://secunia.com/advisories/60325", }, { type: "WEB", url: "http://secunia.com/advisories/60433", }, { type: "WEB", url: "http://secunia.com/advisories/61065", }, { type: "WEB", url: "http://secunia.com/advisories/61128", }, { type: "WEB", url: "http://secunia.com/advisories/61129", }, { type: "WEB", url: "http://secunia.com/advisories/61283", }, { type: "WEB", url: "http://secunia.com/advisories/61287", }, { type: "WEB", url: "http://secunia.com/advisories/61291", }, { type: "WEB", url: "http://secunia.com/advisories/61312", }, { type: "WEB", url: "http://secunia.com/advisories/61313", }, { type: "WEB", url: "http://secunia.com/advisories/61328", }, { type: "WEB", url: "http://secunia.com/advisories/61442", }, { type: "WEB", url: "http://secunia.com/advisories/61471", }, { type: "WEB", url: "http://secunia.com/advisories/61485", }, { type: "WEB", url: "http://secunia.com/advisories/61503", }, { type: "WEB", url: "http://secunia.com/advisories/61550", }, { type: "WEB", url: "http://secunia.com/advisories/61552", }, { type: "WEB", url: "http://secunia.com/advisories/61565", }, { type: "WEB", url: "http://secunia.com/advisories/61603", }, { type: "WEB", url: "http://secunia.com/advisories/61633", }, { type: "WEB", url: "http://secunia.com/advisories/61641", }, { type: "WEB", url: "http://secunia.com/advisories/61643", }, { type: "WEB", url: "http://secunia.com/advisories/61654", }, { type: "WEB", url: "http://secunia.com/advisories/61703", }, { type: "WEB", url: "http://secunia.com/advisories/61780", }, { type: "WEB", url: "http://secunia.com/advisories/61816", }, { type: "WEB", url: "http://secunia.com/advisories/61857", }, { type: "WEB", url: "http://secunia.com/advisories/62312", }, { type: "WEB", url: "http://secunia.com/advisories/62343", }, { type: "WEB", url: "http://support.apple.com/HT204244", }, { type: "WEB", url: "http://support.novell.com/security/cve/CVE-2014-6277.html", }, { type: "WEB", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { type: "WEB", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { type: "WEB", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { type: "WEB", url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { type: "WEB", url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { type: "WEB", url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { type: "WEB", url: "http://www.ubuntu.com/usn/USN-2380-1", }, { type: "WEB", url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, ], schema_version: "1.4.0", severity: [], }
suse-su-2017:2699-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for SLES 12 Docker image", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise Server 12 container image has been updated to include\nsecurity and stability fixes.\n\nThe following issues related to building of the container images have been fixed:\n\n- Included krb5 package to avoid the inclusion of krb5-mini which gets selected as a\n dependency by the Build Service solver. (bsc#1056193)\n- Do not install recommended packages when building container images. (bsc#975726)\n\nA number of security issues that have been already fixed by updates released for\nSUSE Linux Enterprise Server 12 are now included in the base image. A package/CVE\ncross-reference is available below.\n\npam:\n\n- CVE-2015-3238\n\nlibtasn1:\n\n- CVE-2015-3622\n- CVE-2016-4008\n\nlibidn:\n\n- CVE-2015-2059\n- CVE-2015-8948\n- CVE-2016-6261\n- CVE-2016-6262\n- CVE-2016-6263\n\nzlib:\n\n- CVE-2016-9840\n- CVE-2016-9841\n- CVE-2016-9842\n- CVE-2016-9843\n\ncurl:\n\n- CVE-2016-5419\n- CVE-2016-5420\n- CVE-2016-5421\n- CVE-2016-7141\n- CVE-2016-7167\n- CVE-2016-8615\n- CVE-2016-8616\n- CVE-2016-8617\n- CVE-2016-8618\n- CVE-2016-8619\n- CVE-2016-8620\n- CVE-2016-8621\n- CVE-2016-8622\n- CVE-2016-8623\n- CVE-2016-8624\n- CVE-2016-9586\n- CVE-2017-1000100\n- CVE-2017-1000101\n- CVE-2017-7407\n\nopenssl:\n\n- CVE-2016-2105\n- CVE-2016-2106\n- CVE-2016-2107\n- CVE-2016-2108\n- CVE-2016-2109\n- CVE-2016-2177\n- CVE-2016-2178\n- CVE-2016-2179\n- CVE-2016-2180\n- CVE-2016-2181\n- CVE-2016-2182\n- CVE-2016-2183\n- CVE-2016-6302\n- CVE-2016-6303\n- CVE-2016-6304\n- CVE-2016-6306\n\nlibxml2:\n\n- CVE-2014-0191\n- CVE-2015-8806\n- CVE-2016-1762\n- CVE-2016-1833\n- CVE-2016-1834\n- CVE-2016-1835\n- CVE-2016-1837\n- CVE-2016-1838\n- CVE-2016-1839\n- CVE-2016-1840\n- CVE-2016-2073\n- CVE-2016-3627\n- CVE-2016-3705\n- CVE-2016-4447\n- CVE-2016-4448\n- CVE-2016-4449\n- CVE-2016-4483\n- CVE-2016-4658\n- CVE-2016-9318\n- CVE-2016-9597\n- CVE-2017-9047\n- CVE-2017-9048\n- CVE-2017-9049\n- CVE-2017-9050\n\nutil-linux:\n\n- CVE-2015-5218\n- CVE-2016-5011\n- CVE-2017-2616\n\ncracklib:\n\n- CVE-2016-6318\n\nsystemd:\n\n- CVE-2014-9770\n- CVE-2015-8842\n- CVE-2016-7796\n\npcre:\n\n- CVE-2014-8964\n- CVE-2015-2325\n- CVE-2015-2327\n- CVE-2015-2328\n- CVE-2015-3210\n- CVE-2015-3217\n- CVE-2015-5073\n- CVE-2015-8380\n- CVE-2015-8381\n- CVE-2015-8382\n- CVE-2015-8383\n- CVE-2015-8384\n- CVE-2015-8385\n- CVE-2015-8386\n- CVE-2015-8387\n- CVE-2015-8388\n- CVE-2015-8389\n- CVE-2015-8390\n- CVE-2015-8391\n- CVE-2015-8392\n- CVE-2015-8393\n- CVE-2015-8394\n- CVE-2015-8395\n- CVE-2016-1283\n- CVE-2016-3191\n\nappamor:\n\n- CVE-2017-6507\n\nbash:\n\n- CVE-2014-6277\n- CVE-2014-6278\n- CVE-2016-0634\n- CVE-2016-7543\n\ncpio:\n\n- CVE-2016-2037\n\nglibc:\n\n- CVE-2016-1234\n- CVE-2016-3075\n- CVE-2016-3706\n- CVE-2016-4429\n- CVE-2017-1000366\n\nperl:\n\n- CVE-2015-8853\n- CVE-2016-1238\n- CVE-2016-2381\n- CVE-2016-6185\n\nlibssh2_org:\n\n- CVE-2016-0787\n\nexpat:\n\n- CVE-2012-6702\n- CVE-2015-1283\n- CVE-2016-0718\n- CVE-2016-5300\n- CVE-2016-9063\n- CVE-2017-9233\n\nncurses:\n\n- CVE-2017-10684\n- CVE-2017-10685\n- CVE-2017-11112\n- CVE-2017-11113\n\nlibksba:\n\n- CVE-2016-4574\n- CVE-2016-4579\n\nlibgcrypt:\n\n- CVE-2015-7511\n- CVE-2016-6313\n- CVE-2017-7526\n\ndbus-1:\n\n- CVE-2014-7824\n- CVE-2015-0245\n\nFinally, the following packages received non-security fixes:\n\n- augeas\n- bzip2\n- ca-certificates-mozilla\n- coreutils\n- cryptsetup\n- cyrus-sasl\n- dirmngr\n- e2fsprogs\n- findutils\n- gpg2\n- insserv-compat\n- kmod\n- libcap\n- libsolv\n- libzypp\n- openldap2\n- p11-kit\n- permissions\n- procps\n- rpm\n- sed\n- shadow\n- zypper\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Module-Containers-12-2017-1672", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2699-1.json", }, { category: "self", summary: "URL for SUSE-SU-2017:2699-1", url: "https://www.suse.com/support/update/announcement/2017/suse-su-20172699-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2017:2699-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html", }, { category: "self", summary: "SUSE Bug 1056193", url: "https://bugzilla.suse.com/1056193", }, { category: "self", summary: "SUSE Bug 975726", url: "https://bugzilla.suse.com/975726", }, { category: "self", summary: "SUSE CVE CVE-2012-6702 page", url: "https://www.suse.com/security/cve/CVE-2012-6702/", }, { category: "self", summary: "SUSE CVE CVE-2014-0191 page", url: "https://www.suse.com/security/cve/CVE-2014-0191/", }, { category: "self", summary: "SUSE CVE CVE-2014-6271 page", url: "https://www.suse.com/security/cve/CVE-2014-6271/", }, { category: "self", summary: "SUSE CVE CVE-2014-6277 page", url: "https://www.suse.com/security/cve/CVE-2014-6277/", }, { category: "self", summary: "SUSE CVE CVE-2014-6278 page", url: "https://www.suse.com/security/cve/CVE-2014-6278/", }, { category: "self", summary: "SUSE CVE CVE-2014-7169 page", url: "https://www.suse.com/security/cve/CVE-2014-7169/", }, { category: "self", summary: "SUSE CVE CVE-2014-7187 page", url: "https://www.suse.com/security/cve/CVE-2014-7187/", }, { category: "self", summary: "SUSE CVE CVE-2014-7824 page", url: "https://www.suse.com/security/cve/CVE-2014-7824/", }, { category: "self", summary: "SUSE CVE CVE-2014-8964 page", url: "https://www.suse.com/security/cve/CVE-2014-8964/", }, { category: "self", summary: "SUSE CVE CVE-2014-9770 page", url: "https://www.suse.com/security/cve/CVE-2014-9770/", }, { category: "self", summary: "SUSE CVE CVE-2015-0245 page", url: "https://www.suse.com/security/cve/CVE-2015-0245/", }, { category: "self", summary: "SUSE CVE CVE-2015-1283 page", url: "https://www.suse.com/security/cve/CVE-2015-1283/", }, { category: "self", summary: "SUSE CVE CVE-2015-2059 page", url: "https://www.suse.com/security/cve/CVE-2015-2059/", }, { category: "self", summary: "SUSE CVE CVE-2015-2325 page", url: "https://www.suse.com/security/cve/CVE-2015-2325/", }, { category: "self", summary: "SUSE CVE CVE-2015-2327 page", url: "https://www.suse.com/security/cve/CVE-2015-2327/", }, { category: "self", summary: "SUSE CVE CVE-2015-2328 page", url: "https://www.suse.com/security/cve/CVE-2015-2328/", }, { category: "self", summary: "SUSE CVE CVE-2015-3210 page", url: "https://www.suse.com/security/cve/CVE-2015-3210/", }, { category: "self", summary: "SUSE CVE CVE-2015-3217 page", url: "https://www.suse.com/security/cve/CVE-2015-3217/", }, { category: "self", summary: "SUSE CVE CVE-2015-3238 page", url: "https://www.suse.com/security/cve/CVE-2015-3238/", }, { category: "self", summary: "SUSE CVE CVE-2015-3622 page", url: "https://www.suse.com/security/cve/CVE-2015-3622/", }, { category: "self", summary: "SUSE CVE CVE-2015-5073 page", url: "https://www.suse.com/security/cve/CVE-2015-5073/", }, { category: "self", summary: "SUSE CVE CVE-2015-5218 page", url: "https://www.suse.com/security/cve/CVE-2015-5218/", }, { category: "self", summary: "SUSE CVE CVE-2015-5276 page", url: "https://www.suse.com/security/cve/CVE-2015-5276/", }, { category: "self", summary: "SUSE CVE CVE-2015-7511 page", url: "https://www.suse.com/security/cve/CVE-2015-7511/", }, { category: "self", summary: "SUSE CVE CVE-2015-8380 page", url: "https://www.suse.com/security/cve/CVE-2015-8380/", }, { category: "self", summary: "SUSE CVE CVE-2015-8381 page", url: "https://www.suse.com/security/cve/CVE-2015-8381/", }, { category: "self", summary: "SUSE CVE CVE-2015-8382 page", url: "https://www.suse.com/security/cve/CVE-2015-8382/", }, { category: "self", summary: "SUSE CVE CVE-2015-8383 page", url: "https://www.suse.com/security/cve/CVE-2015-8383/", }, { category: "self", summary: "SUSE CVE CVE-2015-8384 page", url: "https://www.suse.com/security/cve/CVE-2015-8384/", }, { category: "self", summary: "SUSE CVE CVE-2015-8385 page", url: "https://www.suse.com/security/cve/CVE-2015-8385/", }, { category: "self", summary: "SUSE CVE CVE-2015-8386 page", url: "https://www.suse.com/security/cve/CVE-2015-8386/", }, { category: "self", summary: "SUSE CVE CVE-2015-8387 page", url: "https://www.suse.com/security/cve/CVE-2015-8387/", }, { category: "self", summary: "SUSE CVE CVE-2015-8388 page", url: "https://www.suse.com/security/cve/CVE-2015-8388/", }, { category: "self", summary: "SUSE CVE CVE-2015-8389 page", url: "https://www.suse.com/security/cve/CVE-2015-8389/", }, { category: "self", summary: "SUSE CVE CVE-2015-8390 page", url: "https://www.suse.com/security/cve/CVE-2015-8390/", }, { category: "self", summary: "SUSE CVE CVE-2015-8391 page", url: "https://www.suse.com/security/cve/CVE-2015-8391/", }, { category: "self", summary: "SUSE CVE CVE-2015-8392 page", url: "https://www.suse.com/security/cve/CVE-2015-8392/", }, { category: "self", summary: "SUSE CVE CVE-2015-8393 page", url: "https://www.suse.com/security/cve/CVE-2015-8393/", }, { category: "self", summary: "SUSE CVE CVE-2015-8394 page", url: "https://www.suse.com/security/cve/CVE-2015-8394/", }, { category: "self", summary: "SUSE CVE CVE-2015-8395 page", url: "https://www.suse.com/security/cve/CVE-2015-8395/", }, { category: "self", summary: "SUSE CVE CVE-2015-8806 page", url: "https://www.suse.com/security/cve/CVE-2015-8806/", }, { category: "self", summary: "SUSE CVE CVE-2015-8842 page", url: "https://www.suse.com/security/cve/CVE-2015-8842/", }, { category: "self", summary: "SUSE CVE CVE-2015-8853 page", url: "https://www.suse.com/security/cve/CVE-2015-8853/", }, { category: "self", summary: "SUSE CVE CVE-2015-8948 page", url: "https://www.suse.com/security/cve/CVE-2015-8948/", }, { category: "self", summary: "SUSE CVE CVE-2016-0634 page", url: "https://www.suse.com/security/cve/CVE-2016-0634/", }, { category: "self", summary: "SUSE CVE CVE-2016-0718 page", url: "https://www.suse.com/security/cve/CVE-2016-0718/", }, { category: "self", summary: "SUSE CVE CVE-2016-0787 page", url: "https://www.suse.com/security/cve/CVE-2016-0787/", }, { category: "self", summary: "SUSE CVE CVE-2016-1234 page", url: "https://www.suse.com/security/cve/CVE-2016-1234/", }, { category: "self", summary: "SUSE CVE CVE-2016-1238 page", url: "https://www.suse.com/security/cve/CVE-2016-1238/", }, { category: "self", summary: "SUSE CVE CVE-2016-1283 page", url: "https://www.suse.com/security/cve/CVE-2016-1283/", }, { category: "self", summary: "SUSE CVE CVE-2016-1762 page", url: "https://www.suse.com/security/cve/CVE-2016-1762/", }, { category: "self", summary: "SUSE CVE CVE-2016-1833 page", url: "https://www.suse.com/security/cve/CVE-2016-1833/", }, { category: "self", summary: "SUSE CVE CVE-2016-1834 page", url: "https://www.suse.com/security/cve/CVE-2016-1834/", }, { category: "self", summary: "SUSE CVE CVE-2016-1835 page", url: "https://www.suse.com/security/cve/CVE-2016-1835/", }, { category: "self", summary: "SUSE CVE CVE-2016-1837 page", url: "https://www.suse.com/security/cve/CVE-2016-1837/", }, { category: "self", summary: "SUSE CVE CVE-2016-1838 page", url: "https://www.suse.com/security/cve/CVE-2016-1838/", }, { category: "self", summary: "SUSE CVE CVE-2016-1839 page", url: "https://www.suse.com/security/cve/CVE-2016-1839/", }, { category: "self", summary: "SUSE CVE CVE-2016-1840 page", url: "https://www.suse.com/security/cve/CVE-2016-1840/", }, { category: "self", summary: "SUSE CVE CVE-2016-2037 page", url: "https://www.suse.com/security/cve/CVE-2016-2037/", }, { category: "self", summary: "SUSE CVE CVE-2016-2073 page", url: "https://www.suse.com/security/cve/CVE-2016-2073/", }, { category: "self", summary: "SUSE CVE CVE-2016-2105 page", url: "https://www.suse.com/security/cve/CVE-2016-2105/", }, { category: "self", summary: "SUSE CVE CVE-2016-2106 page", url: "https://www.suse.com/security/cve/CVE-2016-2106/", }, { category: "self", summary: "SUSE CVE CVE-2016-2107 page", url: "https://www.suse.com/security/cve/CVE-2016-2107/", }, { category: "self", summary: "SUSE CVE CVE-2016-2108 page", url: "https://www.suse.com/security/cve/CVE-2016-2108/", }, { category: "self", summary: "SUSE CVE CVE-2016-2109 page", url: "https://www.suse.com/security/cve/CVE-2016-2109/", }, { category: "self", summary: "SUSE CVE CVE-2016-2177 page", url: "https://www.suse.com/security/cve/CVE-2016-2177/", }, { category: "self", summary: "SUSE CVE CVE-2016-2178 page", url: "https://www.suse.com/security/cve/CVE-2016-2178/", }, { category: "self", summary: "SUSE CVE CVE-2016-2179 page", url: "https://www.suse.com/security/cve/CVE-2016-2179/", }, { category: "self", summary: "SUSE CVE CVE-2016-2180 page", url: "https://www.suse.com/security/cve/CVE-2016-2180/", }, { category: "self", summary: "SUSE CVE CVE-2016-2181 page", url: "https://www.suse.com/security/cve/CVE-2016-2181/", }, { category: "self", summary: "SUSE CVE CVE-2016-2182 page", url: "https://www.suse.com/security/cve/CVE-2016-2182/", }, { category: "self", summary: "SUSE CVE CVE-2016-2183 page", url: "https://www.suse.com/security/cve/CVE-2016-2183/", }, { category: "self", summary: "SUSE CVE CVE-2016-2381 page", url: "https://www.suse.com/security/cve/CVE-2016-2381/", }, { category: "self", summary: "SUSE CVE CVE-2016-3075 page", url: "https://www.suse.com/security/cve/CVE-2016-3075/", }, { category: "self", summary: "SUSE CVE CVE-2016-3191 page", url: "https://www.suse.com/security/cve/CVE-2016-3191/", }, { category: "self", summary: "SUSE CVE CVE-2016-3627 page", url: "https://www.suse.com/security/cve/CVE-2016-3627/", }, { category: "self", summary: "SUSE CVE CVE-2016-3705 page", url: "https://www.suse.com/security/cve/CVE-2016-3705/", }, { category: "self", summary: "SUSE CVE CVE-2016-3706 page", url: "https://www.suse.com/security/cve/CVE-2016-3706/", }, { category: "self", summary: "SUSE CVE CVE-2016-4008 page", url: "https://www.suse.com/security/cve/CVE-2016-4008/", }, { category: "self", summary: "SUSE CVE CVE-2016-4429 page", url: "https://www.suse.com/security/cve/CVE-2016-4429/", }, { category: "self", summary: "SUSE CVE CVE-2016-4447 page", url: "https://www.suse.com/security/cve/CVE-2016-4447/", }, { category: "self", summary: "SUSE CVE CVE-2016-4448 page", url: "https://www.suse.com/security/cve/CVE-2016-4448/", }, { category: "self", summary: "SUSE CVE CVE-2016-4449 page", url: "https://www.suse.com/security/cve/CVE-2016-4449/", }, { category: "self", summary: "SUSE CVE CVE-2016-4483 page", url: "https://www.suse.com/security/cve/CVE-2016-4483/", }, { category: "self", summary: "SUSE CVE CVE-2016-4574 page", url: "https://www.suse.com/security/cve/CVE-2016-4574/", }, { category: "self", summary: "SUSE CVE CVE-2016-4579 page", url: "https://www.suse.com/security/cve/CVE-2016-4579/", }, { category: "self", summary: "SUSE CVE CVE-2016-4658 page", url: "https://www.suse.com/security/cve/CVE-2016-4658/", }, { category: "self", summary: "SUSE CVE CVE-2016-5011 page", url: "https://www.suse.com/security/cve/CVE-2016-5011/", }, { category: "self", summary: "SUSE CVE CVE-2016-5300 page", url: "https://www.suse.com/security/cve/CVE-2016-5300/", }, { category: "self", summary: "SUSE CVE CVE-2016-5419 page", url: "https://www.suse.com/security/cve/CVE-2016-5419/", }, { category: "self", summary: "SUSE CVE CVE-2016-5420 page", url: "https://www.suse.com/security/cve/CVE-2016-5420/", }, { category: "self", summary: "SUSE CVE CVE-2016-5421 page", url: "https://www.suse.com/security/cve/CVE-2016-5421/", }, { category: "self", summary: "SUSE CVE CVE-2016-6185 page", url: "https://www.suse.com/security/cve/CVE-2016-6185/", }, { category: "self", summary: "SUSE CVE CVE-2016-6261 page", url: "https://www.suse.com/security/cve/CVE-2016-6261/", }, { category: "self", summary: "SUSE CVE CVE-2016-6262 page", url: "https://www.suse.com/security/cve/CVE-2016-6262/", }, { category: "self", summary: "SUSE CVE CVE-2016-6263 page", url: "https://www.suse.com/security/cve/CVE-2016-6263/", }, { category: "self", summary: "SUSE CVE CVE-2016-6302 page", url: "https://www.suse.com/security/cve/CVE-2016-6302/", }, { category: "self", summary: "SUSE CVE CVE-2016-6303 page", url: "https://www.suse.com/security/cve/CVE-2016-6303/", }, { category: "self", summary: "SUSE CVE CVE-2016-6304 page", url: "https://www.suse.com/security/cve/CVE-2016-6304/", }, { category: "self", summary: "SUSE CVE CVE-2016-6306 page", url: "https://www.suse.com/security/cve/CVE-2016-6306/", }, { category: "self", summary: "SUSE CVE CVE-2016-6313 page", url: "https://www.suse.com/security/cve/CVE-2016-6313/", }, { category: "self", summary: "SUSE CVE CVE-2016-6318 page", url: "https://www.suse.com/security/cve/CVE-2016-6318/", }, { category: "self", summary: "SUSE CVE CVE-2016-7141 page", url: "https://www.suse.com/security/cve/CVE-2016-7141/", }, { category: "self", summary: "SUSE CVE CVE-2016-7167 page", url: "https://www.suse.com/security/cve/CVE-2016-7167/", }, { category: "self", summary: "SUSE CVE CVE-2016-7543 page", url: "https://www.suse.com/security/cve/CVE-2016-7543/", }, { category: "self", summary: "SUSE CVE CVE-2016-7796 page", url: "https://www.suse.com/security/cve/CVE-2016-7796/", }, { category: "self", summary: "SUSE CVE CVE-2016-8615 page", url: "https://www.suse.com/security/cve/CVE-2016-8615/", }, { category: "self", summary: "SUSE CVE CVE-2016-8616 page", url: "https://www.suse.com/security/cve/CVE-2016-8616/", }, { category: "self", summary: "SUSE CVE CVE-2016-8617 page", url: "https://www.suse.com/security/cve/CVE-2016-8617/", }, { category: "self", summary: "SUSE CVE CVE-2016-8618 page", url: "https://www.suse.com/security/cve/CVE-2016-8618/", }, { category: "self", summary: "SUSE CVE CVE-2016-8619 page", url: "https://www.suse.com/security/cve/CVE-2016-8619/", }, { category: "self", summary: "SUSE CVE CVE-2016-8620 page", url: "https://www.suse.com/security/cve/CVE-2016-8620/", }, { category: "self", summary: "SUSE CVE CVE-2016-8621 page", url: "https://www.suse.com/security/cve/CVE-2016-8621/", }, { category: "self", summary: "SUSE CVE CVE-2016-8622 page", url: "https://www.suse.com/security/cve/CVE-2016-8622/", }, { category: "self", summary: "SUSE CVE CVE-2016-8623 page", url: "https://www.suse.com/security/cve/CVE-2016-8623/", }, { category: "self", summary: "SUSE CVE CVE-2016-8624 page", url: "https://www.suse.com/security/cve/CVE-2016-8624/", }, { category: "self", summary: "SUSE CVE CVE-2016-9063 page", url: "https://www.suse.com/security/cve/CVE-2016-9063/", }, { category: "self", summary: "SUSE CVE CVE-2016-9318 page", url: "https://www.suse.com/security/cve/CVE-2016-9318/", }, { category: "self", summary: "SUSE CVE CVE-2016-9586 page", url: "https://www.suse.com/security/cve/CVE-2016-9586/", }, { category: "self", summary: "SUSE CVE CVE-2016-9597 page", url: "https://www.suse.com/security/cve/CVE-2016-9597/", }, { category: "self", summary: "SUSE CVE CVE-2016-9840 page", url: "https://www.suse.com/security/cve/CVE-2016-9840/", }, { category: "self", summary: "SUSE CVE CVE-2016-9841 page", url: "https://www.suse.com/security/cve/CVE-2016-9841/", }, { category: "self", summary: "SUSE CVE CVE-2016-9842 page", url: "https://www.suse.com/security/cve/CVE-2016-9842/", }, { category: "self", summary: "SUSE CVE CVE-2016-9843 page", url: "https://www.suse.com/security/cve/CVE-2016-9843/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000100 page", url: "https://www.suse.com/security/cve/CVE-2017-1000100/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000101 page", url: "https://www.suse.com/security/cve/CVE-2017-1000101/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000366 page", url: "https://www.suse.com/security/cve/CVE-2017-1000366/", }, { category: "self", summary: "SUSE CVE CVE-2017-10684 page", url: "https://www.suse.com/security/cve/CVE-2017-10684/", }, { category: "self", summary: "SUSE CVE CVE-2017-10685 page", url: "https://www.suse.com/security/cve/CVE-2017-10685/", }, { category: "self", summary: "SUSE CVE CVE-2017-11112 page", url: "https://www.suse.com/security/cve/CVE-2017-11112/", }, { category: "self", summary: "SUSE CVE CVE-2017-11113 page", url: "https://www.suse.com/security/cve/CVE-2017-11113/", }, { category: "self", summary: "SUSE CVE CVE-2017-2616 page", url: "https://www.suse.com/security/cve/CVE-2017-2616/", }, { category: "self", summary: "SUSE CVE CVE-2017-6507 page", url: "https://www.suse.com/security/cve/CVE-2017-6507/", }, { category: "self", summary: "SUSE CVE CVE-2017-7407 page", url: "https://www.suse.com/security/cve/CVE-2017-7407/", }, { category: "self", summary: "SUSE CVE CVE-2017-7526 page", url: "https://www.suse.com/security/cve/CVE-2017-7526/", }, { category: "self", summary: "SUSE CVE CVE-2017-9047 page", url: "https://www.suse.com/security/cve/CVE-2017-9047/", }, { category: "self", summary: "SUSE CVE CVE-2017-9048 page", url: "https://www.suse.com/security/cve/CVE-2017-9048/", }, { category: "self", summary: "SUSE CVE CVE-2017-9049 page", url: "https://www.suse.com/security/cve/CVE-2017-9049/", }, { category: "self", summary: "SUSE CVE CVE-2017-9050 page", url: "https://www.suse.com/security/cve/CVE-2017-9050/", }, { category: "self", summary: "SUSE CVE CVE-2017-9233 page", url: "https://www.suse.com/security/cve/CVE-2017-9233/", }, ], title: "Security update for SLES 12 Docker image", tracking: { current_release_date: "2017-10-10T19:37:24Z", generator: { date: "2017-10-10T19:37:24Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2017:2699-1", initial_release_date: "2017-10-10T19:37:24Z", revision_history: [ { date: "2017-10-10T19:37:24Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "sles12-docker-image-1.1.4-20171002.ppc64le", product: { name: "sles12-docker-image-1.1.4-20171002.ppc64le", product_id: "sles12-docker-image-1.1.4-20171002.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "sles12-docker-image-1.1.4-20171002.s390x", product: { name: "sles12-docker-image-1.1.4-20171002.s390x", product_id: "sles12-docker-image-1.1.4-20171002.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "sles12-docker-image-1.1.4-20171002.x86_64", product: { name: "sles12-docker-image-1.1.4-20171002.x86_64", product_id: "sles12-docker-image-1.1.4-20171002.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Containers 12", product: { name: "SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-containers:12", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "sles12-docker-image-1.1.4-20171002.ppc64le as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", }, product_reference: "sles12-docker-image-1.1.4-20171002.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "sles12-docker-image-1.1.4-20171002.s390x as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", }, product_reference: "sles12-docker-image-1.1.4-20171002.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "sles12-docker-image-1.1.4-20171002.x86_64 as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", }, product_reference: "sles12-docker-image-1.1.4-20171002.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, ], }, vulnerabilities: [ { cve: "CVE-2012-6702", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-6702", }, ], notes: [ { category: "general", text: "Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-6702", url: "https://www.suse.com/security/cve/CVE-2012-6702", }, { category: "external", summary: "SUSE Bug 983215 for CVE-2012-6702", url: "https://bugzilla.suse.com/983215", }, { category: "external", summary: "SUSE Bug 983216 for CVE-2012-6702", url: "https://bugzilla.suse.com/983216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2012-6702", }, { cve: "CVE-2014-0191", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-0191", }, ], notes: [ { category: "general", text: "The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-0191", url: "https://www.suse.com/security/cve/CVE-2014-0191", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2014-0191", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2014-0191", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 876652 for CVE-2014-0191", url: "https://bugzilla.suse.com/876652", }, { category: "external", summary: "SUSE Bug 877506 for CVE-2014-0191", url: "https://bugzilla.suse.com/877506", }, { category: "external", summary: "SUSE Bug 996079 for CVE-2014-0191", url: "https://bugzilla.suse.com/996079", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2014-0191", }, { cve: "CVE-2014-6271", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6271", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6271", url: "https://www.suse.com/security/cve/CVE-2014-6271", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-6271", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 1130324 for CVE-2014-6271", url: "https://bugzilla.suse.com/1130324", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2014-6271", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 896776 for CVE-2014-6271", url: "https://bugzilla.suse.com/896776", }, { category: "external", summary: "SUSE Bug 898346 for CVE-2014-6271", url: "https://bugzilla.suse.com/898346", }, { category: "external", summary: "SUSE Bug 898604 for CVE-2014-6271", url: "https://bugzilla.suse.com/898604", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6271", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6271", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6271", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-6271", url: "https://bugzilla.suse.com/900454", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2014-6271", }, { cve: "CVE-2014-6277", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6277", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6277", url: "https://www.suse.com/security/cve/CVE-2014-6277", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6277", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6277", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6277", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-6277", url: "https://bugzilla.suse.com/900454", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2014-6277", }, { cve: "CVE-2014-6278", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6278", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6278", url: "https://www.suse.com/security/cve/CVE-2014-6278", }, { category: "external", summary: "SUSE Bug 898604 for CVE-2014-6278", url: "https://bugzilla.suse.com/898604", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6278", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6278", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6278", url: "https://bugzilla.suse.com/900127", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2014-6278", }, { cve: "CVE-2014-7169", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7169", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7169", url: "https://www.suse.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-7169", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 1130324 for CVE-2014-7169", url: "https://bugzilla.suse.com/1130324", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2014-7169", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 896776 for CVE-2014-7169", url: "https://bugzilla.suse.com/896776", }, { category: "external", summary: "SUSE Bug 898346 for CVE-2014-7169", url: "https://bugzilla.suse.com/898346", }, { category: "external", summary: "SUSE Bug 898762 for CVE-2014-7169", url: "https://bugzilla.suse.com/898762", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-7169", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-7169", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 899039 for CVE-2014-7169", url: "https://bugzilla.suse.com/899039", }, { category: "external", summary: "SUSE Bug 899266 for CVE-2014-7169", url: "https://bugzilla.suse.com/899266", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-7169", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-7169", url: "https://bugzilla.suse.com/900454", }, { category: "external", summary: "SUSE Bug 902237 for CVE-2014-7169", url: "https://bugzilla.suse.com/902237", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2014-7169", }, { cve: "CVE-2014-7187", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7187", }, ], notes: [ { category: "general", text: "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7187", url: "https://www.suse.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-7187", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 898603 for CVE-2014-7187", url: "https://bugzilla.suse.com/898603", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-7187", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-7187", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 899039 for CVE-2014-7187", url: "https://bugzilla.suse.com/899039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2014-7187", }, { cve: "CVE-2014-7824", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7824", }, ], notes: [ { category: "general", text: "D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7824", url: "https://www.suse.com/security/cve/CVE-2014-7824", }, { category: "external", summary: "SUSE Bug 904017 for CVE-2014-7824", url: "https://bugzilla.suse.com/904017", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2014-7824", }, { cve: "CVE-2014-8964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-8964", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-8964", url: "https://www.suse.com/security/cve/CVE-2014-8964", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2014-8964", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 924960 for CVE-2014-8964", url: "https://bugzilla.suse.com/924960", }, { category: "external", summary: "SUSE Bug 933288 for CVE-2014-8964", url: "https://bugzilla.suse.com/933288", }, { category: "external", summary: "SUSE Bug 936408 for CVE-2014-8964", url: "https://bugzilla.suse.com/936408", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2014-8964", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2014-8964", }, { cve: "CVE-2014-9770", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9770", }, ], notes: [ { category: "general", text: "tmpfiles.d/systemd.conf in systemd before 214 uses weak permissions for journal files under (1) /run/log/journal/%m and (2) /var/log/journal/%m, which allows local users to obtain sensitive information by reading these files.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9770", url: "https://www.suse.com/security/cve/CVE-2014-9770", }, { category: "external", summary: "SUSE Bug 972612 for CVE-2014-9770", url: "https://bugzilla.suse.com/972612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2014-9770", }, { cve: "CVE-2015-0245", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0245", }, ], notes: [ { category: "general", text: "D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0245", url: "https://www.suse.com/security/cve/CVE-2015-0245", }, { category: "external", summary: "SUSE Bug 1003898 for CVE-2015-0245", url: "https://bugzilla.suse.com/1003898", }, { category: "external", summary: "SUSE Bug 916343 for CVE-2015-0245", url: "https://bugzilla.suse.com/916343", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2015-0245", }, { cve: "CVE-2015-1283", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-1283", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-1283", url: "https://www.suse.com/security/cve/CVE-2015-1283", }, { category: "external", summary: "SUSE Bug 1034050 for CVE-2015-1283", url: "https://bugzilla.suse.com/1034050", }, { category: "external", summary: "SUSE Bug 939077 for CVE-2015-1283", url: "https://bugzilla.suse.com/939077", }, { category: "external", summary: "SUSE Bug 979441 for CVE-2015-1283", url: "https://bugzilla.suse.com/979441", }, { category: "external", summary: "SUSE Bug 980391 for CVE-2015-1283", url: "https://bugzilla.suse.com/980391", }, { category: "external", summary: "SUSE Bug 983985 for CVE-2015-1283", url: "https://bugzilla.suse.com/983985", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-1283", }, { cve: "CVE-2015-2059", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2059", }, ], notes: [ { category: "general", text: "The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2059", url: "https://www.suse.com/security/cve/CVE-2015-2059", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2015-2059", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 919214 for CVE-2015-2059", url: "https://bugzilla.suse.com/919214", }, { category: "external", summary: "SUSE Bug 923241 for CVE-2015-2059", url: "https://bugzilla.suse.com/923241", }, { category: "external", summary: "SUSE Bug 937096 for CVE-2015-2059", url: "https://bugzilla.suse.com/937096", }, { category: "external", summary: "SUSE Bug 937097 for CVE-2015-2059", url: "https://bugzilla.suse.com/937097", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2015-2059", }, { cve: "CVE-2015-2325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2325", }, ], notes: [ { category: "general", text: "The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2325", url: "https://www.suse.com/security/cve/CVE-2015-2325", }, { category: "external", summary: "SUSE Bug 924960 for CVE-2015-2325", url: "https://bugzilla.suse.com/924960", }, { category: "external", summary: "SUSE Bug 933288 for CVE-2015-2325", url: "https://bugzilla.suse.com/933288", }, { category: "external", summary: "SUSE Bug 936408 for CVE-2015-2325", url: "https://bugzilla.suse.com/936408", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-2325", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-2325", }, { cve: "CVE-2015-2327", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2327", }, ], notes: [ { category: "general", text: "PCRE before 8.36 mishandles the /(((a\\2)|(a*)\\g<-1>))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2327", url: "https://www.suse.com/security/cve/CVE-2015-2327", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-2327", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957567 for CVE-2015-2327", url: "https://bugzilla.suse.com/957567", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-2327", }, { cve: "CVE-2015-2328", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2328", }, ], notes: [ { category: "general", text: "PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2328", url: "https://www.suse.com/security/cve/CVE-2015-2328", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-2328", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957600 for CVE-2015-2328", url: "https://bugzilla.suse.com/957600", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-2328", }, { cve: "CVE-2015-3210", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3210", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3210", url: "https://www.suse.com/security/cve/CVE-2015-3210", }, { category: "external", summary: "SUSE Bug 933288 for CVE-2015-3210", url: "https://bugzilla.suse.com/933288", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-3210", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-3210", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2015-3210", }, { cve: "CVE-2015-3217", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3217", }, ], notes: [ { category: "general", text: "PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\\\.|([^\\\\\\\\W_])?)+)+$/.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3217", url: "https://www.suse.com/security/cve/CVE-2015-3217", }, { category: "external", summary: "SUSE Bug 933878 for CVE-2015-3217", url: "https://bugzilla.suse.com/933878", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-3217", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-3217", }, { cve: "CVE-2015-3238", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3238", }, ], notes: [ { category: "general", text: "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3238", url: "https://www.suse.com/security/cve/CVE-2015-3238", }, { category: "external", summary: "SUSE Bug 1123794 for CVE-2015-3238", url: "https://bugzilla.suse.com/1123794", }, { category: "external", summary: "SUSE Bug 934920 for CVE-2015-3238", url: "https://bugzilla.suse.com/934920", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-3238", }, { cve: "CVE-2015-3622", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3622", }, ], notes: [ { category: "general", text: "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3622", url: "https://www.suse.com/security/cve/CVE-2015-3622", }, { category: "external", summary: "SUSE Bug 929414 for CVE-2015-3622", url: "https://bugzilla.suse.com/929414", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2015-3622", }, { cve: "CVE-2015-5073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-5073", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-5073", url: "https://www.suse.com/security/cve/CVE-2015-5073", }, { category: "external", summary: "SUSE Bug 936227 for CVE-2015-5073", url: "https://bugzilla.suse.com/936227", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-5073", }, { cve: "CVE-2015-5218", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-5218", }, ], notes: [ { category: "general", text: "Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-5218", url: "https://www.suse.com/security/cve/CVE-2015-5218", }, { category: "external", summary: "SUSE Bug 949754 for CVE-2015-5218", url: "https://bugzilla.suse.com/949754", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2015-5218", }, { cve: "CVE-2015-5276", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-5276", }, ], notes: [ { category: "general", text: "The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-5276", url: "https://www.suse.com/security/cve/CVE-2015-5276", }, { category: "external", summary: "SUSE Bug 945842 for CVE-2015-5276", url: "https://bugzilla.suse.com/945842", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-5276", }, { cve: "CVE-2015-7511", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-7511", }, ], notes: [ { category: "general", text: "Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-7511", url: "https://www.suse.com/security/cve/CVE-2015-7511", }, { category: "external", summary: "SUSE Bug 965902 for CVE-2015-7511", url: "https://bugzilla.suse.com/965902", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-7511", }, { cve: "CVE-2015-8380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8380", }, ], notes: [ { category: "general", text: "The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \\01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8380", url: "https://www.suse.com/security/cve/CVE-2015-8380", }, { category: "external", summary: "SUSE Bug 957566 for CVE-2015-8380", url: "https://bugzilla.suse.com/957566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2015-8380", }, { cve: "CVE-2015-8381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8381", }, ], notes: [ { category: "general", text: "The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?'R')(\\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and /(?J:(?|(:(?|(?'R')(\\z(?|(?'R')(\\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8381", url: "https://www.suse.com/security/cve/CVE-2015-8381", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8381", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8381", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8381", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-8381", }, { cve: "CVE-2015-8382", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8382", }, ], notes: [ { category: "general", text: "The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8382", url: "https://www.suse.com/security/cve/CVE-2015-8382", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8382", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8382", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8382", }, { cve: "CVE-2015-8383", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8383", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8383", url: "https://www.suse.com/security/cve/CVE-2015-8383", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8383", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8383", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8383", }, { cve: "CVE-2015-8384", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8384", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8384", url: "https://www.suse.com/security/cve/CVE-2015-8384", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8384", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8384", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8384", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8384", }, { cve: "CVE-2015-8385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8385", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?|(\\k'Pm')|(?'Pm'))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8385", url: "https://www.suse.com/security/cve/CVE-2015-8385", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8385", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8385", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8385", }, { cve: "CVE-2015-8386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8386", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8386", url: "https://www.suse.com/security/cve/CVE-2015-8386", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8386", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8386", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8386", }, { cve: "CVE-2015-8387", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8387", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8387", url: "https://www.suse.com/security/cve/CVE-2015-8387", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8387", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8387", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8387", }, { cve: "CVE-2015-8388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8388", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8388", url: "https://www.suse.com/security/cve/CVE-2015-8388", }, { category: "external", summary: "SUSE Bug 936227 for CVE-2015-8388", url: "https://bugzilla.suse.com/936227", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8388", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8388", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8388", }, { cve: "CVE-2015-8389", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8389", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8389", url: "https://www.suse.com/security/cve/CVE-2015-8389", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8389", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8389", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8389", }, { cve: "CVE-2015-8390", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8390", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the [: and \\\\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8390", url: "https://www.suse.com/security/cve/CVE-2015-8390", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8390", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8390", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8390", }, { cve: "CVE-2015-8391", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8391", }, ], notes: [ { category: "general", text: "The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8391", url: "https://www.suse.com/security/cve/CVE-2015-8391", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8391", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8391", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8391", }, { cve: "CVE-2015-8392", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8392", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles certain instances of the (?| substring, which allows remote attackers to cause a denial of service (unintended recursion and buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8395.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8392", url: "https://www.suse.com/security/cve/CVE-2015-8392", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8392", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8392", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8392", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-8392", }, { cve: "CVE-2015-8393", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8393", }, ], notes: [ { category: "general", text: "pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8393", url: "https://www.suse.com/security/cve/CVE-2015-8393", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8393", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8393", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8393", }, { cve: "CVE-2015-8394", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8394", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the (?(<digits>) and (?(R<digits>) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8394", url: "https://www.suse.com/security/cve/CVE-2015-8394", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8394", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8394", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8394", }, { cve: "CVE-2015-8395", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8395", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles certain references, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8392.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8395", url: "https://www.suse.com/security/cve/CVE-2015-8395", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8395", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8395", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8395", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8395", }, { cve: "CVE-2015-8806", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8806", }, ], notes: [ { category: "general", text: "dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the \"<!DOCTYPE html\" substring in a crafted HTML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8806", url: "https://www.suse.com/security/cve/CVE-2015-8806", }, { category: "external", summary: "SUSE Bug 963963 for CVE-2015-8806", url: "https://bugzilla.suse.com/963963", }, { category: "external", summary: "SUSE Bug 965283 for CVE-2015-8806", url: "https://bugzilla.suse.com/965283", }, { category: "external", summary: "SUSE Bug 981114 for CVE-2015-8806", url: "https://bugzilla.suse.com/981114", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-8806", }, { cve: "CVE-2015-8842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8842", }, ], notes: [ { category: "general", text: "tmpfiles.d/systemd.conf in systemd before 229 uses weak permissions for /var/log/journal/%m/system.journal, which allows local users to obtain sensitive information by reading the file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8842", url: "https://www.suse.com/security/cve/CVE-2015-8842", }, { category: "external", summary: "SUSE Bug 972612 for CVE-2015-8842", url: "https://bugzilla.suse.com/972612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-8842", }, { cve: "CVE-2015-8853", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8853", }, ], notes: [ { category: "general", text: "The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by \"a\\x80.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8853", url: "https://www.suse.com/security/cve/CVE-2015-8853", }, { category: "external", summary: "SUSE Bug 976584 for CVE-2015-8853", url: "https://bugzilla.suse.com/976584", }, { category: "external", summary: "SUSE Bug 997948 for CVE-2015-8853", url: "https://bugzilla.suse.com/997948", }, { category: "external", summary: "SUSE Bug 997950 for CVE-2015-8853", url: "https://bugzilla.suse.com/997950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-8853", }, { cve: "CVE-2015-8948", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8948", }, ], notes: [ { category: "general", text: "idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8948", url: "https://www.suse.com/security/cve/CVE-2015-8948", }, { category: "external", summary: "SUSE Bug 1014473 for CVE-2015-8948", url: "https://bugzilla.suse.com/1014473", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2015-8948", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 1190777 for CVE-2015-8948", url: "https://bugzilla.suse.com/1190777", }, { category: "external", summary: "SUSE Bug 990189 for CVE-2015-8948", url: "https://bugzilla.suse.com/990189", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-8948", }, { cve: "CVE-2016-0634", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0634", }, ], notes: [ { category: "general", text: "The expansion of '\\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0634", url: "https://www.suse.com/security/cve/CVE-2016-0634", }, { category: "external", summary: "SUSE Bug 1000396 for CVE-2016-0634", url: "https://bugzilla.suse.com/1000396", }, { category: "external", summary: "SUSE Bug 1001299 for CVE-2016-0634", url: "https://bugzilla.suse.com/1001299", }, { category: "external", summary: "SUSE Bug 1159416 for CVE-2016-0634", url: "https://bugzilla.suse.com/1159416", }, { category: "external", summary: "SUSE Bug 1188388 for CVE-2016-0634", url: "https://bugzilla.suse.com/1188388", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-0634", }, { cve: "CVE-2016-0718", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0718", }, ], notes: [ { category: "general", text: "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0718", url: "https://www.suse.com/security/cve/CVE-2016-0718", }, { category: "external", summary: "SUSE Bug 979441 for CVE-2016-0718", url: "https://bugzilla.suse.com/979441", }, { category: "external", summary: "SUSE Bug 991809 for CVE-2016-0718", url: "https://bugzilla.suse.com/991809", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-0718", }, { cve: "CVE-2016-0787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0787", }, ], notes: [ { category: "general", text: "The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a \"bits/bytes confusion bug.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0787", url: "https://www.suse.com/security/cve/CVE-2016-0787", }, { category: "external", summary: "SUSE Bug 1149968 for CVE-2016-0787", url: "https://bugzilla.suse.com/1149968", }, { category: "external", summary: "SUSE Bug 967026 for CVE-2016-0787", url: "https://bugzilla.suse.com/967026", }, { category: "external", summary: "SUSE Bug 968174 for CVE-2016-0787", url: "https://bugzilla.suse.com/968174", }, { category: "external", summary: "SUSE Bug 974691 for CVE-2016-0787", url: "https://bugzilla.suse.com/974691", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-0787", }, { cve: "CVE-2016-1234", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1234", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1234", url: "https://www.suse.com/security/cve/CVE-2016-1234", }, { category: "external", summary: "SUSE Bug 1020940 for CVE-2016-1234", url: "https://bugzilla.suse.com/1020940", }, { category: "external", summary: "SUSE Bug 969727 for CVE-2016-1234", url: "https://bugzilla.suse.com/969727", }, { category: "external", summary: "SUSE Bug 988770 for CVE-2016-1234", url: "https://bugzilla.suse.com/988770", }, { category: "external", summary: "SUSE Bug 988782 for CVE-2016-1234", url: "https://bugzilla.suse.com/988782", }, { category: "external", summary: "SUSE Bug 989127 for CVE-2016-1234", url: "https://bugzilla.suse.com/989127", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-1234", }, { cve: "CVE-2016-1238", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1238", }, ], notes: [ { category: "general", text: "(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1238", url: "https://www.suse.com/security/cve/CVE-2016-1238", }, { category: "external", summary: "SUSE Bug 1108749 for CVE-2016-1238", url: "https://bugzilla.suse.com/1108749", }, { category: "external", summary: "SUSE Bug 1123389 for CVE-2016-1238", url: "https://bugzilla.suse.com/1123389", }, { category: "external", summary: "SUSE Bug 987887 for CVE-2016-1238", url: "https://bugzilla.suse.com/987887", }, { category: "external", summary: "SUSE Bug 988311 for CVE-2016-1238", url: "https://bugzilla.suse.com/988311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-1238", }, { cve: "CVE-2016-1283", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1283", }, ], notes: [ { category: "general", text: "The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\\\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\\){97)?J)?J)(?'R'(?'R'\\){99|(:(?|(?'R')(\\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1283", url: "https://www.suse.com/security/cve/CVE-2016-1283", }, { category: "external", summary: "SUSE Bug 960837 for CVE-2016-1283", url: "https://bugzilla.suse.com/960837", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2016-1283", }, { cve: "CVE-2016-1762", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1762", }, ], notes: [ { category: "general", text: "The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1762", url: "https://www.suse.com/security/cve/CVE-2016-1762", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1762", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981040 for CVE-2016-1762", url: "https://bugzilla.suse.com/981040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-1762", }, { cve: "CVE-2016-1833", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1833", }, ], notes: [ { category: "general", text: "The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1833", url: "https://www.suse.com/security/cve/CVE-2016-1833", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1833", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981108 for CVE-2016-1833", url: "https://bugzilla.suse.com/981108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-1833", }, { cve: "CVE-2016-1834", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1834", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1834", url: "https://www.suse.com/security/cve/CVE-2016-1834", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1834", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981041 for CVE-2016-1834", url: "https://bugzilla.suse.com/981041", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-1834", }, { cve: "CVE-2016-1835", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1835", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1835", url: "https://www.suse.com/security/cve/CVE-2016-1835", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1835", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981109 for CVE-2016-1835", url: "https://bugzilla.suse.com/981109", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-1835", }, { cve: "CVE-2016-1837", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1837", }, ], notes: [ { category: "general", text: "Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1837", url: "https://www.suse.com/security/cve/CVE-2016-1837", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1837", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981111 for CVE-2016-1837", url: "https://bugzilla.suse.com/981111", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-1837", }, { cve: "CVE-2016-1838", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1838", }, ], notes: [ { category: "general", text: "The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1838", url: "https://www.suse.com/security/cve/CVE-2016-1838", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1838", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981112 for CVE-2016-1838", url: "https://bugzilla.suse.com/981112", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-1838", }, { cve: "CVE-2016-1839", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1839", }, ], notes: [ { category: "general", text: "The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1839", url: "https://www.suse.com/security/cve/CVE-2016-1839", }, { category: "external", summary: "SUSE Bug 1039069 for CVE-2016-1839", url: "https://bugzilla.suse.com/1039069", }, { category: "external", summary: "SUSE Bug 1039661 for CVE-2016-1839", url: "https://bugzilla.suse.com/1039661", }, { category: "external", summary: "SUSE Bug 1069433 for CVE-2016-1839", url: "https://bugzilla.suse.com/1069433", }, { category: "external", summary: "SUSE Bug 1069690 for CVE-2016-1839", url: "https://bugzilla.suse.com/1069690", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1839", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 963963 for CVE-2016-1839", url: "https://bugzilla.suse.com/963963", }, { category: "external", summary: "SUSE Bug 981114 for CVE-2016-1839", url: "https://bugzilla.suse.com/981114", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-1839", }, { cve: "CVE-2016-1840", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1840", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1840", url: "https://www.suse.com/security/cve/CVE-2016-1840", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1840", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981115 for CVE-2016-1840", url: "https://bugzilla.suse.com/981115", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-1840", }, { cve: "CVE-2016-2037", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2037", }, ], notes: [ { category: "general", text: "The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2037", url: "https://www.suse.com/security/cve/CVE-2016-2037", }, { category: "external", summary: "SUSE Bug 1028410 for CVE-2016-2037", url: "https://bugzilla.suse.com/1028410", }, { category: "external", summary: "SUSE Bug 963448 for CVE-2016-2037", url: "https://bugzilla.suse.com/963448", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2037", }, { cve: "CVE-2016-2073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2073", }, ], notes: [ { category: "general", text: "The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2073", url: "https://www.suse.com/security/cve/CVE-2016-2073", }, { category: "external", summary: "SUSE Bug 963963 for CVE-2016-2073", url: "https://bugzilla.suse.com/963963", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-2073", }, { cve: "CVE-2016-2105", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2105", }, ], notes: [ { category: "general", text: "Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2105", url: "https://www.suse.com/security/cve/CVE-2016-2105", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2105", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977614 for CVE-2016-2105", url: "https://bugzilla.suse.com/977614", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2105", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 989902 for CVE-2016-2105", url: "https://bugzilla.suse.com/989902", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2105", url: "https://bugzilla.suse.com/990369", }, { category: "external", summary: "SUSE Bug 990370 for CVE-2016-2105", url: "https://bugzilla.suse.com/990370", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2105", }, { cve: "CVE-2016-2106", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2106", }, ], notes: [ { category: "general", text: "Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2106", url: "https://www.suse.com/security/cve/CVE-2016-2106", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2106", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977615 for CVE-2016-2106", url: "https://bugzilla.suse.com/977615", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2106", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 979279 for CVE-2016-2106", url: "https://bugzilla.suse.com/979279", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2106", url: "https://bugzilla.suse.com/990369", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2106", }, { cve: "CVE-2016-2107", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2107", }, ], notes: [ { category: "general", text: "The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2107", url: "https://www.suse.com/security/cve/CVE-2016-2107", }, { category: "external", summary: "SUSE Bug 976942 for CVE-2016-2107", url: "https://bugzilla.suse.com/976942", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2107", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977616 for CVE-2016-2107", url: "https://bugzilla.suse.com/977616", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2107", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2107", url: "https://bugzilla.suse.com/990369", }, { category: "external", summary: "SUSE Bug 990370 for CVE-2016-2107", url: "https://bugzilla.suse.com/990370", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-2107", }, { cve: "CVE-2016-2108", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2108", }, ], notes: [ { category: "general", text: "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2108", url: "https://www.suse.com/security/cve/CVE-2016-2108", }, { category: "external", summary: "SUSE Bug 1001502 for CVE-2016-2108", url: "https://bugzilla.suse.com/1001502", }, { category: "external", summary: "SUSE Bug 1004499 for CVE-2016-2108", url: "https://bugzilla.suse.com/1004499", }, { category: "external", summary: "SUSE Bug 1005878 for CVE-2016-2108", url: "https://bugzilla.suse.com/1005878", }, { category: "external", summary: "SUSE Bug 1148697 for CVE-2016-2108", url: "https://bugzilla.suse.com/1148697", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2108", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977617 for CVE-2016-2108", url: "https://bugzilla.suse.com/977617", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2108", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 989345 for CVE-2016-2108", url: "https://bugzilla.suse.com/989345", }, { category: "external", summary: "SUSE Bug 996067 for CVE-2016-2108", url: "https://bugzilla.suse.com/996067", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-2108", }, { cve: "CVE-2016-2109", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2109", }, ], notes: [ { category: "general", text: "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2109", url: "https://www.suse.com/security/cve/CVE-2016-2109", }, { category: "external", summary: "SUSE Bug 1015243 for CVE-2016-2109", url: "https://bugzilla.suse.com/1015243", }, { category: "external", summary: "SUSE Bug 976942 for CVE-2016-2109", url: "https://bugzilla.suse.com/976942", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2109", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2109", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2109", url: "https://bugzilla.suse.com/990369", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-2109", }, { cve: "CVE-2016-2177", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2177", }, ], notes: [ { category: "general", text: "OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2177", url: "https://www.suse.com/security/cve/CVE-2016-2177", }, { category: "external", summary: "SUSE Bug 982575 for CVE-2016-2177", url: "https://bugzilla.suse.com/982575", }, { category: "external", summary: "SUSE Bug 999075 for CVE-2016-2177", url: "https://bugzilla.suse.com/999075", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2177", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-2177", }, { cve: "CVE-2016-2178", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2178", }, ], notes: [ { category: "general", text: "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2178", url: "https://www.suse.com/security/cve/CVE-2016-2178", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2178", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 983249 for CVE-2016-2178", url: "https://bugzilla.suse.com/983249", }, { category: "external", summary: "SUSE Bug 983519 for CVE-2016-2178", url: "https://bugzilla.suse.com/983519", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2178", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2178", }, { cve: "CVE-2016-2179", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2179", }, ], notes: [ { category: "general", text: "The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2179", url: "https://www.suse.com/security/cve/CVE-2016-2179", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2179", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2179", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2179", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-2179", }, { cve: "CVE-2016-2180", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2180", }, ], notes: [ { category: "general", text: "The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the \"openssl ts\" command.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2180", url: "https://www.suse.com/security/cve/CVE-2016-2180", }, { category: "external", summary: "SUSE Bug 1003811 for CVE-2016-2180", url: "https://bugzilla.suse.com/1003811", }, { category: "external", summary: "SUSE Bug 990419 for CVE-2016-2180", url: "https://bugzilla.suse.com/990419", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2180", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2180", }, { cve: "CVE-2016-2181", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2181", }, ], notes: [ { category: "general", text: "The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2181", url: "https://www.suse.com/security/cve/CVE-2016-2181", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2181", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 994749 for CVE-2016-2181", url: "https://bugzilla.suse.com/994749", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2181", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2181", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2181", }, { cve: "CVE-2016-2182", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2182", }, ], notes: [ { category: "general", text: "The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2182", url: "https://www.suse.com/security/cve/CVE-2016-2182", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2182", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 993819 for CVE-2016-2182", url: "https://bugzilla.suse.com/993819", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2182", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995959 for CVE-2016-2182", url: "https://bugzilla.suse.com/995959", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2182", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2182", }, { cve: "CVE-2016-2183", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2183", }, ], notes: [ { category: "general", text: "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2183", url: "https://www.suse.com/security/cve/CVE-2016-2183", }, { category: "external", summary: "SUSE Bug 1001912 for CVE-2016-2183", url: "https://bugzilla.suse.com/1001912", }, { category: "external", summary: "SUSE Bug 1024218 for CVE-2016-2183", url: "https://bugzilla.suse.com/1024218", }, { category: "external", summary: "SUSE Bug 1027038 for CVE-2016-2183", url: "https://bugzilla.suse.com/1027038", }, { category: "external", summary: "SUSE Bug 1034689 for CVE-2016-2183", url: "https://bugzilla.suse.com/1034689", }, { category: "external", summary: "SUSE Bug 1056614 for CVE-2016-2183", url: "https://bugzilla.suse.com/1056614", }, { category: "external", summary: "SUSE Bug 1171693 for CVE-2016-2183", url: "https://bugzilla.suse.com/1171693", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2183", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995359 for CVE-2016-2183", url: "https://bugzilla.suse.com/995359", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-2183", }, { cve: "CVE-2016-2381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2381", }, ], notes: [ { category: "general", text: "Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2381", url: "https://www.suse.com/security/cve/CVE-2016-2381", }, { category: "external", summary: "SUSE Bug 967082 for CVE-2016-2381", url: "https://bugzilla.suse.com/967082", }, { category: "external", summary: "SUSE Bug 992991 for CVE-2016-2381", url: "https://bugzilla.suse.com/992991", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-2381", }, { cve: "CVE-2016-3075", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3075", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3075", url: "https://www.suse.com/security/cve/CVE-2016-3075", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2016-3075", url: "https://bugzilla.suse.com/1123874", }, { category: "external", summary: "SUSE Bug 973164 for CVE-2016-3075", url: "https://bugzilla.suse.com/973164", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-3075", }, { cve: "CVE-2016-3191", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3191", }, ], notes: [ { category: "general", text: "The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3191", url: "https://www.suse.com/security/cve/CVE-2016-3191", }, { category: "external", summary: "SUSE Bug 971741 for CVE-2016-3191", url: "https://bugzilla.suse.com/971741", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-3191", }, { cve: "CVE-2016-3627", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3627", }, ], notes: [ { category: "general", text: "The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3627", url: "https://www.suse.com/security/cve/CVE-2016-3627", }, { category: "external", summary: "SUSE Bug 1026099 for CVE-2016-3627", url: "https://bugzilla.suse.com/1026099", }, { category: "external", summary: "SUSE Bug 1026101 for CVE-2016-3627", url: "https://bugzilla.suse.com/1026101", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-3627", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 972335 for CVE-2016-3627", url: "https://bugzilla.suse.com/972335", }, { category: "external", summary: "SUSE Bug 975947 for CVE-2016-3627", url: "https://bugzilla.suse.com/975947", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-3627", }, { cve: "CVE-2016-3705", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3705", }, ], notes: [ { category: "general", text: "The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3705", url: "https://www.suse.com/security/cve/CVE-2016-3705", }, { category: "external", summary: "SUSE Bug 1017497 for CVE-2016-3705", url: "https://bugzilla.suse.com/1017497", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-3705", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 975947 for CVE-2016-3705", url: "https://bugzilla.suse.com/975947", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-3705", }, { cve: "CVE-2016-3706", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3706", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3706", url: "https://www.suse.com/security/cve/CVE-2016-3706", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2016-3706", url: "https://bugzilla.suse.com/1123874", }, { category: "external", summary: "SUSE Bug 980483 for CVE-2016-3706", url: "https://bugzilla.suse.com/980483", }, { category: "external", summary: "SUSE Bug 997423 for CVE-2016-3706", url: "https://bugzilla.suse.com/997423", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-3706", }, { cve: "CVE-2016-4008", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4008", }, ], notes: [ { category: "general", text: "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4008", url: "https://www.suse.com/security/cve/CVE-2016-4008", }, { category: "external", summary: "SUSE Bug 982779 for CVE-2016-4008", url: "https://bugzilla.suse.com/982779", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-4008", }, { cve: "CVE-2016-4429", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4429", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4429", url: "https://www.suse.com/security/cve/CVE-2016-4429", }, { category: "external", summary: "SUSE Bug 1081556 for CVE-2016-4429", url: "https://bugzilla.suse.com/1081556", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2016-4429", url: "https://bugzilla.suse.com/1123874", }, { category: "external", summary: "SUSE Bug 980854 for CVE-2016-4429", url: "https://bugzilla.suse.com/980854", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-4429", }, { cve: "CVE-2016-4447", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4447", }, ], notes: [ { category: "general", text: "The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4447", url: "https://www.suse.com/security/cve/CVE-2016-4447", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4447", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981548 for CVE-2016-4447", url: "https://bugzilla.suse.com/981548", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-4447", }, { cve: "CVE-2016-4448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4448", }, ], notes: [ { category: "general", text: "Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4448", url: "https://www.suse.com/security/cve/CVE-2016-4448", }, { category: "external", summary: "SUSE Bug 1010299 for CVE-2016-4448", url: "https://bugzilla.suse.com/1010299", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4448", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981549 for CVE-2016-4448", url: "https://bugzilla.suse.com/981549", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-4448", }, { cve: "CVE-2016-4449", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4449", }, ], notes: [ { category: "general", text: "XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4449", url: "https://www.suse.com/security/cve/CVE-2016-4449", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4449", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981550 for CVE-2016-4449", url: "https://bugzilla.suse.com/981550", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-4449", }, { cve: "CVE-2016-4483", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4483", }, ], notes: [ { category: "general", text: "The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4483", url: "https://www.suse.com/security/cve/CVE-2016-4483", }, { category: "external", summary: "SUSE Bug 1026101 for CVE-2016-4483", url: "https://bugzilla.suse.com/1026101", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4483", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 978395 for CVE-2016-4483", url: "https://bugzilla.suse.com/978395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-4483", }, { cve: "CVE-2016-4574", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4574", }, ], notes: [ { category: "general", text: "Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4574", url: "https://www.suse.com/security/cve/CVE-2016-4574", }, { category: "external", summary: "SUSE Bug 1135436 for CVE-2016-4574", url: "https://bugzilla.suse.com/1135436", }, { category: "external", summary: "SUSE Bug 979261 for CVE-2016-4574", url: "https://bugzilla.suse.com/979261", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-4574", }, { cve: "CVE-2016-4579", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4579", }, ], notes: [ { category: "general", text: "Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the \"returned length of the object from _ksba_ber_parse_tl.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4579", url: "https://www.suse.com/security/cve/CVE-2016-4579", }, { category: "external", summary: "SUSE Bug 1135436 for CVE-2016-4579", url: "https://bugzilla.suse.com/1135436", }, { category: "external", summary: "SUSE Bug 979906 for CVE-2016-4579", url: "https://bugzilla.suse.com/979906", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-4579", }, { cve: "CVE-2016-4658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4658", }, ], notes: [ { category: "general", text: "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4658", url: "https://www.suse.com/security/cve/CVE-2016-4658", }, { category: "external", summary: "SUSE Bug 1005544 for CVE-2016-4658", url: "https://bugzilla.suse.com/1005544", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2016-4658", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1069433 for CVE-2016-4658", url: "https://bugzilla.suse.com/1069433", }, { category: "external", summary: "SUSE Bug 1078813 for CVE-2016-4658", url: "https://bugzilla.suse.com/1078813", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4658", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-4658", }, { cve: "CVE-2016-5011", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5011", }, ], notes: [ { category: "general", text: "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5011", url: "https://www.suse.com/security/cve/CVE-2016-5011", }, { category: "external", summary: "SUSE Bug 988361 for CVE-2016-5011", url: "https://bugzilla.suse.com/988361", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-5011", }, { cve: "CVE-2016-5300", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5300", }, ], notes: [ { category: "general", text: "The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5300", url: "https://www.suse.com/security/cve/CVE-2016-5300", }, { category: "external", summary: "SUSE Bug 983216 for CVE-2016-5300", url: "https://bugzilla.suse.com/983216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-5300", }, { cve: "CVE-2016-5419", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5419", }, ], notes: [ { category: "general", text: "curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5419", url: "https://www.suse.com/security/cve/CVE-2016-5419", }, { category: "external", summary: "SUSE Bug 1033413 for CVE-2016-5419", url: "https://bugzilla.suse.com/1033413", }, { category: "external", summary: "SUSE Bug 1033442 for CVE-2016-5419", url: "https://bugzilla.suse.com/1033442", }, { category: "external", summary: "SUSE Bug 991389 for CVE-2016-5419", url: "https://bugzilla.suse.com/991389", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-5419", }, { cve: "CVE-2016-5420", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5420", }, ], notes: [ { category: "general", text: "curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5420", url: "https://www.suse.com/security/cve/CVE-2016-5420", }, { category: "external", summary: "SUSE Bug 991390 for CVE-2016-5420", url: "https://bugzilla.suse.com/991390", }, { category: "external", summary: "SUSE Bug 997420 for CVE-2016-5420", url: "https://bugzilla.suse.com/997420", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-5420", }, { cve: "CVE-2016-5421", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5421", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5421", url: "https://www.suse.com/security/cve/CVE-2016-5421", }, { category: "external", summary: "SUSE Bug 991391 for CVE-2016-5421", url: "https://bugzilla.suse.com/991391", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-5421", }, { cve: "CVE-2016-6185", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6185", }, ], notes: [ { category: "general", text: "The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6185", url: "https://www.suse.com/security/cve/CVE-2016-6185", }, { category: "external", summary: "SUSE Bug 988311 for CVE-2016-6185", url: "https://bugzilla.suse.com/988311", }, { category: "external", summary: "SUSE Bug 999993 for CVE-2016-6185", url: "https://bugzilla.suse.com/999993", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-6185", }, { cve: "CVE-2016-6261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6261", }, ], notes: [ { category: "general", text: "The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6261", url: "https://www.suse.com/security/cve/CVE-2016-6261", }, { category: "external", summary: "SUSE Bug 1118435 for CVE-2016-6261", url: "https://bugzilla.suse.com/1118435", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2016-6261", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 990190 for CVE-2016-6261", url: "https://bugzilla.suse.com/990190", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-6261", }, { cve: "CVE-2016-6262", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6262", }, ], notes: [ { category: "general", text: "idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6262", url: "https://www.suse.com/security/cve/CVE-2016-6262", }, { category: "external", summary: "SUSE Bug 1014473 for CVE-2016-6262", url: "https://bugzilla.suse.com/1014473", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2016-6262", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 1190777 for CVE-2016-6262", url: "https://bugzilla.suse.com/1190777", }, { category: "external", summary: "SUSE Bug 990189 for CVE-2016-6262", url: "https://bugzilla.suse.com/990189", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-6262", }, { cve: "CVE-2016-6263", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6263", }, ], notes: [ { category: "general", text: "The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6263", url: "https://www.suse.com/security/cve/CVE-2016-6263", }, { category: "external", summary: "SUSE Bug 1118435 for CVE-2016-6263", url: "https://bugzilla.suse.com/1118435", }, { category: "external", summary: "SUSE Bug 990191 for CVE-2016-6263", url: "https://bugzilla.suse.com/990191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-6263", }, { cve: "CVE-2016-6302", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6302", }, ], notes: [ { category: "general", text: "The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6302", url: "https://www.suse.com/security/cve/CVE-2016-6302", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6302", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-6302", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995324 for CVE-2016-6302", url: "https://bugzilla.suse.com/995324", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6302", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-6302", }, { cve: "CVE-2016-6303", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6303", }, ], notes: [ { category: "general", text: "Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6303", url: "https://www.suse.com/security/cve/CVE-2016-6303", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6303", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-6303", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-6303", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995377 for CVE-2016-6303", url: "https://bugzilla.suse.com/995377", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6303", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-6303", }, { cve: "CVE-2016-6304", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6304", }, ], notes: [ { category: "general", text: "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6304", url: "https://www.suse.com/security/cve/CVE-2016-6304", }, { category: "external", summary: "SUSE Bug 1001706 for CVE-2016-6304", url: "https://bugzilla.suse.com/1001706", }, { category: "external", summary: "SUSE Bug 1003811 for CVE-2016-6304", url: "https://bugzilla.suse.com/1003811", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6304", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 1005579 for CVE-2016-6304", url: "https://bugzilla.suse.com/1005579", }, { category: "external", summary: "SUSE Bug 1021375 for CVE-2016-6304", url: "https://bugzilla.suse.com/1021375", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6304", url: "https://bugzilla.suse.com/999665", }, { category: "external", summary: "SUSE Bug 999666 for CVE-2016-6304", url: "https://bugzilla.suse.com/999666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-6304", }, { cve: "CVE-2016-6306", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6306", }, ], notes: [ { category: "general", text: "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6306", url: "https://www.suse.com/security/cve/CVE-2016-6306", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6306", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6306", url: "https://bugzilla.suse.com/999665", }, { category: "external", summary: "SUSE Bug 999668 for CVE-2016-6306", url: "https://bugzilla.suse.com/999668", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-6306", }, { cve: "CVE-2016-6313", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6313", }, ], notes: [ { category: "general", text: "The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6313", url: "https://www.suse.com/security/cve/CVE-2016-6313", }, { category: "external", summary: "SUSE Bug 1123792 for CVE-2016-6313", url: "https://bugzilla.suse.com/1123792", }, { category: "external", summary: "SUSE Bug 994157 for CVE-2016-6313", url: "https://bugzilla.suse.com/994157", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-6313", }, { cve: "CVE-2016-6318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6318", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6318", url: "https://www.suse.com/security/cve/CVE-2016-6318", }, { category: "external", summary: "SUSE Bug 1123113 for CVE-2016-6318", url: "https://bugzilla.suse.com/1123113", }, { category: "external", summary: "SUSE Bug 992966 for CVE-2016-6318", url: "https://bugzilla.suse.com/992966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-6318", }, { cve: "CVE-2016-7141", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7141", }, ], notes: [ { category: "general", text: "curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7141", url: "https://www.suse.com/security/cve/CVE-2016-7141", }, { category: "external", summary: "SUSE Bug 991390 for CVE-2016-7141", url: "https://bugzilla.suse.com/991390", }, { category: "external", summary: "SUSE Bug 997420 for CVE-2016-7141", url: "https://bugzilla.suse.com/997420", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-7141", }, { cve: "CVE-2016-7167", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7167", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7167", url: "https://www.suse.com/security/cve/CVE-2016-7167", }, { category: "external", summary: "SUSE Bug 998760 for CVE-2016-7167", url: "https://bugzilla.suse.com/998760", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-7167", }, { cve: "CVE-2016-7543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7543", }, ], notes: [ { category: "general", text: "Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7543", url: "https://www.suse.com/security/cve/CVE-2016-7543", }, { category: "external", summary: "SUSE Bug 1001299 for CVE-2016-7543", url: "https://bugzilla.suse.com/1001299", }, { category: "external", summary: "SUSE Bug 1159416 for CVE-2016-7543", url: "https://bugzilla.suse.com/1159416", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-7543", }, { cve: "CVE-2016-7796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7796", }, ], notes: [ { category: "general", text: "The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7796", url: "https://www.suse.com/security/cve/CVE-2016-7796", }, { category: "external", summary: "SUSE Bug 1001765 for CVE-2016-7796", url: "https://bugzilla.suse.com/1001765", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-7796", }, { cve: "CVE-2016-8615", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8615", }, ], notes: [ { category: "general", text: "A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8615", url: "https://www.suse.com/security/cve/CVE-2016-8615", }, { category: "external", summary: "SUSE Bug 1005633 for CVE-2016-8615", url: "https://bugzilla.suse.com/1005633", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-8615", }, { cve: "CVE-2016-8616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8616", }, ], notes: [ { category: "general", text: "A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8616", url: "https://www.suse.com/security/cve/CVE-2016-8616", }, { category: "external", summary: "SUSE Bug 1005634 for CVE-2016-8616", url: "https://bugzilla.suse.com/1005634", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-8616", }, { cve: "CVE-2016-8617", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8617", }, ], notes: [ { category: "general", text: "The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8617", url: "https://www.suse.com/security/cve/CVE-2016-8617", }, { category: "external", summary: "SUSE Bug 1005635 for CVE-2016-8617", url: "https://bugzilla.suse.com/1005635", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-8617", }, { cve: "CVE-2016-8618", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8618", }, ], notes: [ { category: "general", text: "The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8618", url: "https://www.suse.com/security/cve/CVE-2016-8618", }, { category: "external", summary: "SUSE Bug 1005637 for CVE-2016-8618", url: "https://bugzilla.suse.com/1005637", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-8618", }, { cve: "CVE-2016-8619", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8619", }, ], notes: [ { category: "general", text: "The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8619", url: "https://www.suse.com/security/cve/CVE-2016-8619", }, { category: "external", summary: "SUSE Bug 1005638 for CVE-2016-8619", url: "https://bugzilla.suse.com/1005638", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-8619", }, { cve: "CVE-2016-8620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8620", }, ], notes: [ { category: "general", text: "The 'globbing' feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8620", url: "https://www.suse.com/security/cve/CVE-2016-8620", }, { category: "external", summary: "SUSE Bug 1005640 for CVE-2016-8620", url: "https://bugzilla.suse.com/1005640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-8620", }, { cve: "CVE-2016-8621", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8621", }, ], notes: [ { category: "general", text: "The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8621", url: "https://www.suse.com/security/cve/CVE-2016-8621", }, { category: "external", summary: "SUSE Bug 1005642 for CVE-2016-8621", url: "https://bugzilla.suse.com/1005642", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-8621", }, { cve: "CVE-2016-8622", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8622", }, ], notes: [ { category: "general", text: "The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8622", url: "https://www.suse.com/security/cve/CVE-2016-8622", }, { category: "external", summary: "SUSE Bug 1005643 for CVE-2016-8622", url: "https://bugzilla.suse.com/1005643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-8622", }, { cve: "CVE-2016-8623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8623", }, ], notes: [ { category: "general", text: "A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8623", url: "https://www.suse.com/security/cve/CVE-2016-8623", }, { category: "external", summary: "SUSE Bug 1005645 for CVE-2016-8623", url: "https://bugzilla.suse.com/1005645", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-8623", }, { cve: "CVE-2016-8624", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8624", }, ], notes: [ { category: "general", text: "curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8624", url: "https://www.suse.com/security/cve/CVE-2016-8624", }, { category: "external", summary: "SUSE Bug 1005646 for CVE-2016-8624", url: "https://bugzilla.suse.com/1005646", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-8624", }, { cve: "CVE-2016-9063", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9063", }, ], notes: [ { category: "general", text: "An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9063", url: "https://www.suse.com/security/cve/CVE-2016-9063", }, { category: "external", summary: "SUSE Bug 1009026 for CVE-2016-9063", url: "https://bugzilla.suse.com/1009026", }, { category: "external", summary: "SUSE Bug 1010424 for CVE-2016-9063", url: "https://bugzilla.suse.com/1010424", }, { category: "external", summary: "SUSE Bug 1047240 for CVE-2016-9063", url: "https://bugzilla.suse.com/1047240", }, { category: "external", summary: "SUSE Bug 1123115 for CVE-2016-9063", url: "https://bugzilla.suse.com/1123115", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2016-9063", }, { cve: "CVE-2016-9318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9318", }, ], notes: [ { category: "general", text: "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9318", url: "https://www.suse.com/security/cve/CVE-2016-9318", }, { category: "external", summary: "SUSE Bug 1010675 for CVE-2016-9318", url: "https://bugzilla.suse.com/1010675", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2016-9318", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1019074 for CVE-2016-9318", url: "https://bugzilla.suse.com/1019074", }, { category: "external", summary: "SUSE Bug 1118959 for CVE-2016-9318", url: "https://bugzilla.suse.com/1118959", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-9318", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 1126613 for CVE-2016-9318", url: "https://bugzilla.suse.com/1126613", }, { category: "external", summary: "SUSE Bug 1148896 for CVE-2016-9318", url: "https://bugzilla.suse.com/1148896", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9318", }, { cve: "CVE-2016-9586", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9586", }, ], notes: [ { category: "general", text: "curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9586", url: "https://www.suse.com/security/cve/CVE-2016-9586", }, { category: "external", summary: "SUSE Bug 1015332 for CVE-2016-9586", url: "https://bugzilla.suse.com/1015332", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9586", }, { cve: "CVE-2016-9597", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9597", }, ], notes: [ { category: "general", text: "It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression CVE for the same issue as CVE-2016-3705.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9597", url: "https://www.suse.com/security/cve/CVE-2016-9597", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2016-9597", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1017497 for CVE-2016-9597", url: "https://bugzilla.suse.com/1017497", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-9597", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9597", }, { cve: "CVE-2016-9840", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9840", }, ], notes: [ { category: "general", text: "inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9840", url: "https://www.suse.com/security/cve/CVE-2016-9840", }, { category: "external", summary: "SUSE Bug 1003579 for CVE-2016-9840", url: "https://bugzilla.suse.com/1003579", }, { category: "external", summary: "SUSE Bug 1022633 for CVE-2016-9840", url: "https://bugzilla.suse.com/1022633", }, { category: "external", summary: "SUSE Bug 1023215 for CVE-2016-9840", url: "https://bugzilla.suse.com/1023215", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9840", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1062104 for CVE-2016-9840", url: "https://bugzilla.suse.com/1062104", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9840", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9840", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9840", url: "https://bugzilla.suse.com/1127473", }, { category: "external", summary: "SUSE Bug 1184301 for CVE-2016-9840", url: "https://bugzilla.suse.com/1184301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9840", }, { cve: "CVE-2016-9841", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9841", }, ], notes: [ { category: "general", text: "inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9841", url: "https://www.suse.com/security/cve/CVE-2016-9841", }, { category: "external", summary: "SUSE Bug 1003579 for CVE-2016-9841", url: "https://bugzilla.suse.com/1003579", }, { category: "external", summary: "SUSE Bug 1022633 for CVE-2016-9841", url: "https://bugzilla.suse.com/1022633", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9841", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1064070 for CVE-2016-9841", url: "https://bugzilla.suse.com/1064070", }, { category: "external", summary: "SUSE Bug 1070162 for CVE-2016-9841", url: "https://bugzilla.suse.com/1070162", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9841", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9841", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9841", url: "https://bugzilla.suse.com/1127473", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9841", }, { cve: "CVE-2016-9842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9842", }, ], notes: [ { category: "general", text: "The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9842", url: "https://www.suse.com/security/cve/CVE-2016-9842", }, { category: "external", summary: "SUSE Bug 1003580 for CVE-2016-9842", url: "https://bugzilla.suse.com/1003580", }, { category: "external", summary: "SUSE Bug 1022633 for CVE-2016-9842", url: "https://bugzilla.suse.com/1022633", }, { category: "external", summary: "SUSE Bug 1023215 for CVE-2016-9842", url: "https://bugzilla.suse.com/1023215", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9842", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1062104 for CVE-2016-9842", url: "https://bugzilla.suse.com/1062104", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9842", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9842", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9842", url: "https://bugzilla.suse.com/1127473", }, { category: "external", summary: "SUSE Bug 1184301 for CVE-2016-9842", url: "https://bugzilla.suse.com/1184301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9842", }, { cve: "CVE-2016-9843", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9843", }, ], notes: [ { category: "general", text: "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9843", url: "https://www.suse.com/security/cve/CVE-2016-9843", }, { category: "external", summary: "SUSE Bug 1003580 for CVE-2016-9843", url: "https://bugzilla.suse.com/1003580", }, { category: "external", summary: "SUSE Bug 1013882 for CVE-2016-9843", url: "https://bugzilla.suse.com/1013882", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9843", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1062104 for CVE-2016-9843", url: "https://bugzilla.suse.com/1062104", }, { category: "external", summary: "SUSE Bug 1116686 for CVE-2016-9843", url: "https://bugzilla.suse.com/1116686", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9843", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9843", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9843", url: "https://bugzilla.suse.com/1127473", }, { category: "external", summary: "SUSE Bug 1184301 for CVE-2016-9843", url: "https://bugzilla.suse.com/1184301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9843", }, { cve: "CVE-2017-1000100", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000100", }, ], notes: [ { category: "general", text: "When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000100", url: "https://www.suse.com/security/cve/CVE-2017-1000100", }, { category: "external", summary: "SUSE Bug 1051644 for CVE-2017-1000100", url: "https://bugzilla.suse.com/1051644", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2017-1000100", }, { cve: "CVE-2017-1000101", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000101", }, ], notes: [ { category: "general", text: "curl supports \"globbing\" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000101", url: "https://www.suse.com/security/cve/CVE-2017-1000101", }, { category: "external", summary: "SUSE Bug 1051643 for CVE-2017-1000101", url: "https://bugzilla.suse.com/1051643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-1000101", }, { cve: "CVE-2017-1000366", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000366", }, ], notes: [ { category: "general", text: "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000366", url: "https://www.suse.com/security/cve/CVE-2017-1000366", }, { category: "external", summary: "SUSE Bug 1037551 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1037551", }, { category: "external", summary: "SUSE Bug 1039357 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1039357", }, { category: "external", summary: "SUSE Bug 1063847 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1063847", }, { category: "external", summary: "SUSE Bug 1071319 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1071319", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1123874", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-1000366", }, { cve: "CVE-2017-10684", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10684", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10684", url: "https://www.suse.com/security/cve/CVE-2017-10684", }, { category: "external", summary: "SUSE Bug 1046858 for CVE-2017-10684", url: "https://bugzilla.suse.com/1046858", }, { category: "external", summary: "SUSE Bug 1115932 for CVE-2017-10684", url: "https://bugzilla.suse.com/1115932", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-10684", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-10684", }, { cve: "CVE-2017-10685", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10685", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10685", url: "https://www.suse.com/security/cve/CVE-2017-10685", }, { category: "external", summary: "SUSE Bug 1046853 for CVE-2017-10685", url: "https://bugzilla.suse.com/1046853", }, { category: "external", summary: "SUSE Bug 1115932 for CVE-2017-10685", url: "https://bugzilla.suse.com/1115932", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-10685", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-10685", }, { cve: "CVE-2017-11112", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-11112", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-11112", url: "https://www.suse.com/security/cve/CVE-2017-11112", }, { category: "external", summary: "SUSE Bug 1046853 for CVE-2017-11112", url: "https://bugzilla.suse.com/1046853", }, { category: "external", summary: "SUSE Bug 1047964 for CVE-2017-11112", url: "https://bugzilla.suse.com/1047964", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-11112", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-11112", }, { cve: "CVE-2017-11113", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-11113", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-11113", url: "https://www.suse.com/security/cve/CVE-2017-11113", }, { category: "external", summary: "SUSE Bug 1046853 for CVE-2017-11113", url: "https://bugzilla.suse.com/1046853", }, { category: "external", summary: "SUSE Bug 1047965 for CVE-2017-11113", url: "https://bugzilla.suse.com/1047965", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-11113", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-11113", }, { cve: "CVE-2017-2616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2616", }, ], notes: [ { category: "general", text: "A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-2616", url: "https://www.suse.com/security/cve/CVE-2017-2616", }, { category: "external", summary: "SUSE Bug 1023041 for CVE-2017-2616", url: "https://bugzilla.suse.com/1023041", }, { category: "external", summary: "SUSE Bug 1123789 for CVE-2017-2616", url: "https://bugzilla.suse.com/1123789", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2017-2616", }, { cve: "CVE-2017-6507", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6507", }, ], notes: [ { category: "general", text: "An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6507", url: "https://www.suse.com/security/cve/CVE-2017-6507", }, { category: "external", summary: "SUSE Bug 1029696 for CVE-2017-6507", url: "https://bugzilla.suse.com/1029696", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-6507", }, { cve: "CVE-2017-7407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7407", }, ], notes: [ { category: "general", text: "The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7407", url: "https://www.suse.com/security/cve/CVE-2017-7407", }, { category: "external", summary: "SUSE Bug 1032309 for CVE-2017-7407", url: "https://bugzilla.suse.com/1032309", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2017-7407", }, { cve: "CVE-2017-7526", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7526", }, ], notes: [ { category: "general", text: "libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7526", url: "https://www.suse.com/security/cve/CVE-2017-7526", }, { category: "external", summary: "SUSE Bug 1046607 for CVE-2017-7526", url: "https://bugzilla.suse.com/1046607", }, { category: "external", summary: "SUSE Bug 1047462 for CVE-2017-7526", url: "https://bugzilla.suse.com/1047462", }, { category: "external", summary: "SUSE Bug 1123792 for CVE-2017-7526", url: "https://bugzilla.suse.com/1123792", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.9, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2017-7526", }, { cve: "CVE-2017-9047", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9047", }, ], notes: [ { category: "general", text: "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9047", url: "https://www.suse.com/security/cve/CVE-2017-9047", }, { category: "external", summary: "SUSE Bug 1039063 for CVE-2017-9047", url: "https://bugzilla.suse.com/1039063", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9047", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039657 for CVE-2017-9047", url: "https://bugzilla.suse.com/1039657", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2017-9047", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-9047", }, { cve: "CVE-2017-9048", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9048", }, ], notes: [ { category: "general", text: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9048", url: "https://www.suse.com/security/cve/CVE-2017-9048", }, { category: "external", summary: "SUSE Bug 1039064 for CVE-2017-9048", url: "https://bugzilla.suse.com/1039064", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9048", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039658 for CVE-2017-9048", url: "https://bugzilla.suse.com/1039658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-9048", }, { cve: "CVE-2017-9049", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9049", }, ], notes: [ { category: "general", text: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9049", url: "https://www.suse.com/security/cve/CVE-2017-9049", }, { category: "external", summary: "SUSE Bug 1039063 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039063", }, { category: "external", summary: "SUSE Bug 1039064 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039064", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039659 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039659", }, { category: "external", summary: "SUSE Bug 1039661 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039661", }, { category: "external", summary: "SUSE Bug 1069690 for CVE-2017-9049", url: "https://bugzilla.suse.com/1069690", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2017-9049", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2017-9049", }, { cve: "CVE-2017-9050", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9050", }, ], notes: [ { category: "general", text: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9050", url: "https://www.suse.com/security/cve/CVE-2017-9050", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9050", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039069 for CVE-2017-9050", url: "https://bugzilla.suse.com/1039069", }, { category: "external", summary: "SUSE Bug 1039661 for CVE-2017-9050", url: "https://bugzilla.suse.com/1039661", }, { category: "external", summary: "SUSE Bug 1069433 for CVE-2017-9050", url: "https://bugzilla.suse.com/1069433", }, { category: "external", summary: "SUSE Bug 1069690 for CVE-2017-9050", url: "https://bugzilla.suse.com/1069690", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2017-9050", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2017-9050", }, { cve: "CVE-2017-9233", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9233", }, ], notes: [ { category: "general", text: "XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9233", url: "https://www.suse.com/security/cve/CVE-2017-9233", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9233", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1047236 for CVE-2017-9233", url: "https://bugzilla.suse.com/1047236", }, { category: "external", summary: "SUSE Bug 1073350 for CVE-2017-9233", url: "https://bugzilla.suse.com/1073350", }, { category: "external", summary: "SUSE Bug 1123115 for CVE-2017-9233", url: "https://bugzilla.suse.com/1123115", }, { category: "external", summary: "SUSE Bug 983216 for CVE-2017-9233", url: "https://bugzilla.suse.com/983216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2017-9233", }, ], }
suse-su-2017:2700-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for SLES 12-SP1 Docker image", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise Server 12 SP1 container image has been updated to include\nsecurity and stability fixes.\n\nThe following issues related to building of the container images have been fixed:\n\n- Included krb5 package to avoid the inclusion of krb5-mini which gets selected as a\n dependency by the Build Service solver. (bsc#1056193)\n- Do not install recommended packages when building container images. (bsc#975726)\n\nA number of security issues that have been already fixed by updates released for\nSUSE Linux Enterprise Server 12 SP1 are now included in the base image. A package/CVE\ncross-reference is available below.\n\npam:\n\n- CVE-2015-3238\n\nlibtasn1:\n\n- CVE-2015-3622\n- CVE-2016-4008\n\nexpat:\n\nexpat:\n\n- CVE-2012-6702\n- CVE-2015-1283\n- CVE-2016-0718\n- CVE-2016-5300\n- CVE-2016-9063\n- CVE-2017-9233\n\nlibidn:\n\n- CVE-2015-2059\n- CVE-2015-8948\n- CVE-2016-6261\n- CVE-2016-6262\n- CVE-2016-6263\n\n\nzlib:\n\n- CVE-2016-9840\n- CVE-2016-9841\n- CVE-2016-9842\n- CVE-2016-9843\n\ncurl:\n\n- CVE-2016-5419\n- CVE-2016-5420\n- CVE-2016-5421\n- CVE-2016-7141\n- CVE-2016-7167\n- CVE-2016-8615\n- CVE-2016-8616\n- CVE-2016-8617\n- CVE-2016-8618\n- CVE-2016-8619\n- CVE-2016-8620\n- CVE-2016-8621\n- CVE-2016-8622\n- CVE-2016-8623\n- CVE-2016-8624\n- CVE-2016-9586\n- CVE-2017-1000100\n- CVE-2017-1000101\n- CVE-2017-7407\n\nopenssl:\n\n- CVE-2016-2105\n- CVE-2016-2106\n- CVE-2016-2107\n- CVE-2016-2108\n- CVE-2016-2109\n- CVE-2016-2177\n- CVE-2016-2178\n- CVE-2016-2179\n- CVE-2016-2180\n- CVE-2016-2181\n- CVE-2016-2182\n- CVE-2016-2183\n- CVE-2016-6302\n- CVE-2016-6303\n- CVE-2016-6304\n- CVE-2016-6306\n- CVE-2016-7056\n- CVE-2016-8610\n- CVE-2017-3731\n\ncracklib:\n\n- CVE-2016-6318\n\npcre:\n\n- CVE-2014-8964\n- CVE-2015-2325\n- CVE-2015-2327\n- CVE-2015-2328\n- CVE-2015-3210\n- CVE-2015-3217\n- CVE-2015-5073\n- CVE-2015-8380\n- CVE-2015-8381\n- CVE-2015-8382\n- CVE-2015-8383\n- CVE-2015-8384\n- CVE-2015-8385\n- CVE-2015-8386\n- CVE-2015-8387\n- CVE-2015-8388\n- CVE-2015-8389\n- CVE-2015-8390\n- CVE-2015-8391\n- CVE-2015-8392\n- CVE-2015-8393\n- CVE-2015-8394\n- CVE-2015-8395\n- CVE-2016-1283\n- CVE-2016-3191\n\nappamor:\n\n- CVE-2017-6507\n\nbash:\n\n- CVE-2014-6277\n- CVE-2014-6278\n- CVE-2016-0634\n- CVE-2016-7543\n\ncpio:\n\n- CVE-2016-2037\n\nglibc:\n\n- CVE-2016-1234\n- CVE-2016-3075\n- CVE-2016-3706\n- CVE-2016-4429\n- CVE-2017-1000366\n\nperl:\n\n- CVE-2015-8853\n- CVE-2016-1238\n- CVE-2016-2381\n- CVE-2016-6185\n\nlibssh2_org:\n\n- CVE-2016-0787\n\nutil-linux:\n\n- CVE-2016-5011\n- CVE-2017-2616\n\nncurses:\n\n- CVE-2017-10684\n- CVE-2017-10685\n- CVE-2017-11112\n- CVE-2017-11113\n\nlibksba:\n\n- CVE-2016-4574\n- CVE-2016-4579\n\nlibxml2:\n\n- CVE-2014-0191\n- CVE-2015-8806\n- CVE-2016-1762\n- CVE-2016-1833\n- CVE-2016-1834\n- CVE-2016-1835\n- CVE-2016-1837\n- CVE-2016-1838\n- CVE-2016-1839\n- CVE-2016-1840\n- CVE-2016-2073\n- CVE-2016-3627\n- CVE-2016-3705\n- CVE-2016-4447\n- CVE-2016-4448\n- CVE-2016-4449\n- CVE-2016-4483\n- CVE-2016-4658\n- CVE-2016-9318\n- CVE-2016-9597\n- CVE-2017-9047\n- CVE-2017-9048\n- CVE-2017-9049\n- CVE-2017-9050\n\nlibgcrypt:\n\n- CVE-2015-7511\n- CVE-2016-6313\n- CVE-2017-7526\n\nupdate-alternatives:\n\n- CVE-2015-0860\n\nsystemd:\n\n- CVE-2014-9770\n- CVE-2015-8842\n- CVE-2016-7796\n\ndbus-1:\n\n- CVE-2014-7824\n- CVE-2015-0245\n\nFinally, the following packages received non-security fixes:\n\n- augeas\n- bzip2\n- ca-certificates-mozilla\n- coreutils\n- cryptsetup\n- cyrus-sasl\n- dirmngr\n- e2fsprogs\n- findutils\n- gpg2\n- insserv-compat\n- kmod\n- libcap\n- libsolv\n- libzypp\n- lua51\n- lvm2\n- netcfg\n- p11-kit\n- permissions\n- procps\n- rpm\n- sed\n- sg3_utils\n- shadow\n- zypper\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Module-Containers-12-2017-1673", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2700-1.json", }, { category: "self", summary: "URL for SUSE-SU-2017:2700-1", url: "https://www.suse.com/support/update/announcement/2017/suse-su-20172700-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2017:2700-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html", }, { category: "self", summary: "SUSE Bug 1056193", url: "https://bugzilla.suse.com/1056193", }, { category: "self", summary: "SUSE Bug 975726", url: "https://bugzilla.suse.com/975726", }, { category: "self", summary: "SUSE CVE CVE-2012-6702 page", url: "https://www.suse.com/security/cve/CVE-2012-6702/", }, { category: "self", summary: "SUSE CVE CVE-2014-0191 page", url: "https://www.suse.com/security/cve/CVE-2014-0191/", }, { category: "self", summary: "SUSE CVE CVE-2014-6271 page", url: "https://www.suse.com/security/cve/CVE-2014-6271/", }, { category: "self", summary: "SUSE CVE CVE-2014-6277 page", url: "https://www.suse.com/security/cve/CVE-2014-6277/", }, { category: "self", summary: "SUSE CVE CVE-2014-6278 page", url: "https://www.suse.com/security/cve/CVE-2014-6278/", }, { category: "self", summary: "SUSE CVE CVE-2014-7169 page", url: "https://www.suse.com/security/cve/CVE-2014-7169/", }, { category: "self", summary: "SUSE CVE CVE-2014-7187 page", url: "https://www.suse.com/security/cve/CVE-2014-7187/", }, { category: "self", summary: "SUSE CVE CVE-2014-7824 page", url: "https://www.suse.com/security/cve/CVE-2014-7824/", }, { category: "self", summary: "SUSE CVE CVE-2014-8964 page", url: "https://www.suse.com/security/cve/CVE-2014-8964/", }, { category: "self", summary: "SUSE CVE CVE-2014-9770 page", url: "https://www.suse.com/security/cve/CVE-2014-9770/", }, { category: "self", summary: "SUSE CVE CVE-2015-0245 page", url: "https://www.suse.com/security/cve/CVE-2015-0245/", }, { category: "self", summary: "SUSE CVE CVE-2015-0860 page", url: "https://www.suse.com/security/cve/CVE-2015-0860/", }, { category: "self", summary: "SUSE CVE CVE-2015-1283 page", url: "https://www.suse.com/security/cve/CVE-2015-1283/", }, { category: "self", summary: "SUSE CVE CVE-2015-2059 page", url: "https://www.suse.com/security/cve/CVE-2015-2059/", }, { category: "self", summary: "SUSE CVE CVE-2015-2325 page", url: "https://www.suse.com/security/cve/CVE-2015-2325/", }, { category: "self", summary: "SUSE CVE CVE-2015-2327 page", url: "https://www.suse.com/security/cve/CVE-2015-2327/", }, { category: "self", summary: "SUSE CVE CVE-2015-2328 page", url: "https://www.suse.com/security/cve/CVE-2015-2328/", }, { category: "self", summary: "SUSE CVE CVE-2015-3210 page", url: "https://www.suse.com/security/cve/CVE-2015-3210/", }, { category: "self", summary: "SUSE CVE CVE-2015-3217 page", url: "https://www.suse.com/security/cve/CVE-2015-3217/", }, { category: "self", summary: "SUSE CVE CVE-2015-3238 page", url: "https://www.suse.com/security/cve/CVE-2015-3238/", }, { category: "self", summary: "SUSE CVE CVE-2015-3622 page", url: "https://www.suse.com/security/cve/CVE-2015-3622/", }, { category: "self", summary: "SUSE CVE CVE-2015-5073 page", url: "https://www.suse.com/security/cve/CVE-2015-5073/", }, { category: "self", summary: "SUSE CVE CVE-2015-5276 page", url: "https://www.suse.com/security/cve/CVE-2015-5276/", }, { category: "self", summary: "SUSE CVE CVE-2015-7511 page", url: "https://www.suse.com/security/cve/CVE-2015-7511/", }, { category: "self", summary: "SUSE CVE CVE-2015-8380 page", url: "https://www.suse.com/security/cve/CVE-2015-8380/", }, { category: "self", summary: "SUSE CVE CVE-2015-8381 page", url: "https://www.suse.com/security/cve/CVE-2015-8381/", }, { category: "self", summary: "SUSE CVE CVE-2015-8382 page", url: "https://www.suse.com/security/cve/CVE-2015-8382/", }, { category: "self", summary: "SUSE CVE CVE-2015-8383 page", url: "https://www.suse.com/security/cve/CVE-2015-8383/", }, { category: "self", summary: "SUSE CVE CVE-2015-8384 page", url: "https://www.suse.com/security/cve/CVE-2015-8384/", }, { category: "self", summary: "SUSE CVE CVE-2015-8385 page", url: "https://www.suse.com/security/cve/CVE-2015-8385/", }, { category: "self", summary: "SUSE CVE CVE-2015-8386 page", url: "https://www.suse.com/security/cve/CVE-2015-8386/", }, { category: "self", summary: "SUSE CVE CVE-2015-8387 page", url: "https://www.suse.com/security/cve/CVE-2015-8387/", }, { category: "self", summary: "SUSE CVE CVE-2015-8388 page", url: "https://www.suse.com/security/cve/CVE-2015-8388/", }, { category: "self", summary: "SUSE CVE CVE-2015-8389 page", url: "https://www.suse.com/security/cve/CVE-2015-8389/", }, { category: "self", summary: "SUSE CVE CVE-2015-8390 page", url: "https://www.suse.com/security/cve/CVE-2015-8390/", }, { category: "self", summary: "SUSE CVE CVE-2015-8391 page", url: "https://www.suse.com/security/cve/CVE-2015-8391/", }, { category: "self", summary: "SUSE CVE CVE-2015-8392 page", url: "https://www.suse.com/security/cve/CVE-2015-8392/", }, { category: "self", summary: "SUSE CVE CVE-2015-8393 page", url: "https://www.suse.com/security/cve/CVE-2015-8393/", }, { category: "self", summary: "SUSE CVE CVE-2015-8394 page", url: "https://www.suse.com/security/cve/CVE-2015-8394/", }, { category: "self", summary: "SUSE CVE CVE-2015-8395 page", url: "https://www.suse.com/security/cve/CVE-2015-8395/", }, { category: "self", summary: "SUSE CVE CVE-2015-8806 page", url: "https://www.suse.com/security/cve/CVE-2015-8806/", }, { category: "self", summary: "SUSE CVE CVE-2015-8842 page", url: "https://www.suse.com/security/cve/CVE-2015-8842/", }, { category: "self", summary: "SUSE CVE CVE-2015-8853 page", url: "https://www.suse.com/security/cve/CVE-2015-8853/", }, { category: "self", summary: "SUSE CVE CVE-2015-8948 page", url: "https://www.suse.com/security/cve/CVE-2015-8948/", }, { category: "self", summary: "SUSE CVE CVE-2016-0634 page", url: "https://www.suse.com/security/cve/CVE-2016-0634/", }, { category: "self", summary: "SUSE CVE CVE-2016-0718 page", url: "https://www.suse.com/security/cve/CVE-2016-0718/", }, { category: "self", summary: "SUSE CVE CVE-2016-0787 page", url: "https://www.suse.com/security/cve/CVE-2016-0787/", }, { category: "self", summary: "SUSE CVE CVE-2016-1234 page", url: "https://www.suse.com/security/cve/CVE-2016-1234/", }, { category: "self", summary: "SUSE CVE CVE-2016-1238 page", url: "https://www.suse.com/security/cve/CVE-2016-1238/", }, { category: "self", summary: "SUSE CVE CVE-2016-1283 page", url: "https://www.suse.com/security/cve/CVE-2016-1283/", }, { category: "self", summary: "SUSE CVE CVE-2016-1762 page", url: "https://www.suse.com/security/cve/CVE-2016-1762/", }, { category: "self", summary: "SUSE CVE CVE-2016-1833 page", url: "https://www.suse.com/security/cve/CVE-2016-1833/", }, { category: "self", summary: "SUSE CVE CVE-2016-1834 page", url: "https://www.suse.com/security/cve/CVE-2016-1834/", }, { category: "self", summary: "SUSE CVE CVE-2016-1835 page", url: "https://www.suse.com/security/cve/CVE-2016-1835/", }, { category: "self", summary: "SUSE CVE CVE-2016-1837 page", url: "https://www.suse.com/security/cve/CVE-2016-1837/", }, { category: "self", summary: "SUSE CVE CVE-2016-1838 page", url: "https://www.suse.com/security/cve/CVE-2016-1838/", }, { category: "self", summary: "SUSE CVE CVE-2016-1839 page", url: "https://www.suse.com/security/cve/CVE-2016-1839/", }, { category: "self", summary: "SUSE CVE CVE-2016-1840 page", url: "https://www.suse.com/security/cve/CVE-2016-1840/", }, { category: "self", summary: "SUSE CVE CVE-2016-2037 page", url: "https://www.suse.com/security/cve/CVE-2016-2037/", }, { category: "self", summary: "SUSE CVE CVE-2016-2073 page", url: "https://www.suse.com/security/cve/CVE-2016-2073/", }, { category: "self", summary: "SUSE CVE CVE-2016-2105 page", url: "https://www.suse.com/security/cve/CVE-2016-2105/", }, { category: "self", summary: "SUSE CVE CVE-2016-2106 page", url: "https://www.suse.com/security/cve/CVE-2016-2106/", }, { category: "self", summary: "SUSE CVE CVE-2016-2107 page", url: "https://www.suse.com/security/cve/CVE-2016-2107/", }, { category: "self", summary: "SUSE CVE CVE-2016-2108 page", url: "https://www.suse.com/security/cve/CVE-2016-2108/", }, { category: "self", summary: "SUSE CVE CVE-2016-2109 page", url: "https://www.suse.com/security/cve/CVE-2016-2109/", }, { category: "self", summary: "SUSE CVE CVE-2016-2177 page", url: "https://www.suse.com/security/cve/CVE-2016-2177/", }, { category: "self", summary: "SUSE CVE CVE-2016-2178 page", url: "https://www.suse.com/security/cve/CVE-2016-2178/", }, { category: "self", summary: "SUSE CVE CVE-2016-2179 page", url: "https://www.suse.com/security/cve/CVE-2016-2179/", }, { category: "self", summary: "SUSE CVE CVE-2016-2180 page", url: "https://www.suse.com/security/cve/CVE-2016-2180/", }, { category: "self", summary: "SUSE CVE CVE-2016-2181 page", url: "https://www.suse.com/security/cve/CVE-2016-2181/", }, { category: "self", summary: "SUSE CVE CVE-2016-2182 page", url: "https://www.suse.com/security/cve/CVE-2016-2182/", }, { category: "self", summary: "SUSE CVE CVE-2016-2183 page", url: "https://www.suse.com/security/cve/CVE-2016-2183/", }, { category: "self", summary: "SUSE CVE CVE-2016-2381 page", url: "https://www.suse.com/security/cve/CVE-2016-2381/", }, { category: "self", summary: "SUSE CVE CVE-2016-3075 page", url: "https://www.suse.com/security/cve/CVE-2016-3075/", }, { category: "self", summary: "SUSE CVE CVE-2016-3191 page", url: "https://www.suse.com/security/cve/CVE-2016-3191/", }, { category: "self", summary: "SUSE CVE CVE-2016-3627 page", url: "https://www.suse.com/security/cve/CVE-2016-3627/", }, { category: "self", summary: "SUSE CVE CVE-2016-3705 page", url: "https://www.suse.com/security/cve/CVE-2016-3705/", }, { category: "self", summary: "SUSE CVE CVE-2016-3706 page", url: "https://www.suse.com/security/cve/CVE-2016-3706/", }, { category: "self", summary: "SUSE CVE CVE-2016-4008 page", url: "https://www.suse.com/security/cve/CVE-2016-4008/", }, { category: "self", summary: "SUSE CVE CVE-2016-4429 page", url: "https://www.suse.com/security/cve/CVE-2016-4429/", }, { category: "self", summary: "SUSE CVE CVE-2016-4447 page", url: "https://www.suse.com/security/cve/CVE-2016-4447/", }, { category: "self", summary: "SUSE CVE CVE-2016-4448 page", url: "https://www.suse.com/security/cve/CVE-2016-4448/", }, { category: "self", summary: "SUSE CVE CVE-2016-4449 page", url: "https://www.suse.com/security/cve/CVE-2016-4449/", }, { category: "self", summary: "SUSE CVE CVE-2016-4483 page", url: "https://www.suse.com/security/cve/CVE-2016-4483/", }, { category: "self", summary: "SUSE CVE CVE-2016-4574 page", url: "https://www.suse.com/security/cve/CVE-2016-4574/", }, { category: "self", summary: "SUSE CVE CVE-2016-4579 page", url: "https://www.suse.com/security/cve/CVE-2016-4579/", }, { category: "self", summary: "SUSE CVE CVE-2016-4658 page", url: "https://www.suse.com/security/cve/CVE-2016-4658/", }, { category: "self", summary: "SUSE CVE CVE-2016-5011 page", url: "https://www.suse.com/security/cve/CVE-2016-5011/", }, { category: "self", summary: "SUSE CVE CVE-2016-5300 page", url: "https://www.suse.com/security/cve/CVE-2016-5300/", }, { category: "self", summary: "SUSE CVE CVE-2016-5419 page", url: "https://www.suse.com/security/cve/CVE-2016-5419/", }, { category: "self", summary: "SUSE CVE CVE-2016-5420 page", url: "https://www.suse.com/security/cve/CVE-2016-5420/", }, { category: "self", summary: "SUSE CVE CVE-2016-5421 page", url: "https://www.suse.com/security/cve/CVE-2016-5421/", }, { category: "self", summary: "SUSE CVE CVE-2016-6185 page", url: "https://www.suse.com/security/cve/CVE-2016-6185/", }, { category: "self", summary: "SUSE CVE CVE-2016-6261 page", url: "https://www.suse.com/security/cve/CVE-2016-6261/", }, { category: "self", summary: "SUSE CVE CVE-2016-6262 page", url: "https://www.suse.com/security/cve/CVE-2016-6262/", }, { category: "self", summary: "SUSE CVE CVE-2016-6263 page", url: "https://www.suse.com/security/cve/CVE-2016-6263/", }, { category: "self", summary: "SUSE CVE CVE-2016-6302 page", url: "https://www.suse.com/security/cve/CVE-2016-6302/", }, { category: "self", summary: "SUSE CVE CVE-2016-6303 page", url: "https://www.suse.com/security/cve/CVE-2016-6303/", }, { category: "self", summary: "SUSE CVE CVE-2016-6304 page", url: "https://www.suse.com/security/cve/CVE-2016-6304/", }, { category: "self", summary: "SUSE CVE CVE-2016-6306 page", url: "https://www.suse.com/security/cve/CVE-2016-6306/", }, { category: "self", summary: "SUSE CVE CVE-2016-6313 page", url: "https://www.suse.com/security/cve/CVE-2016-6313/", }, { category: "self", summary: "SUSE CVE CVE-2016-6318 page", url: "https://www.suse.com/security/cve/CVE-2016-6318/", }, { category: "self", summary: "SUSE CVE CVE-2016-7056 page", url: "https://www.suse.com/security/cve/CVE-2016-7056/", }, { category: "self", summary: "SUSE CVE CVE-2016-7141 page", url: "https://www.suse.com/security/cve/CVE-2016-7141/", }, { category: "self", summary: "SUSE CVE CVE-2016-7167 page", url: "https://www.suse.com/security/cve/CVE-2016-7167/", }, { category: "self", summary: "SUSE CVE CVE-2016-7543 page", url: "https://www.suse.com/security/cve/CVE-2016-7543/", }, { category: "self", summary: "SUSE CVE CVE-2016-7796 page", url: "https://www.suse.com/security/cve/CVE-2016-7796/", }, { category: "self", summary: "SUSE CVE CVE-2016-8610 page", url: "https://www.suse.com/security/cve/CVE-2016-8610/", }, { category: "self", summary: "SUSE CVE CVE-2016-8615 page", url: "https://www.suse.com/security/cve/CVE-2016-8615/", }, { category: "self", summary: "SUSE CVE CVE-2016-8616 page", url: "https://www.suse.com/security/cve/CVE-2016-8616/", }, { category: "self", summary: "SUSE CVE CVE-2016-8617 page", url: "https://www.suse.com/security/cve/CVE-2016-8617/", }, { category: "self", summary: "SUSE CVE CVE-2016-8618 page", url: "https://www.suse.com/security/cve/CVE-2016-8618/", }, { category: "self", summary: "SUSE CVE CVE-2016-8619 page", url: "https://www.suse.com/security/cve/CVE-2016-8619/", }, { category: "self", summary: "SUSE CVE CVE-2016-8620 page", url: "https://www.suse.com/security/cve/CVE-2016-8620/", }, { category: "self", summary: "SUSE CVE CVE-2016-8621 page", url: "https://www.suse.com/security/cve/CVE-2016-8621/", }, { category: "self", summary: "SUSE CVE CVE-2016-8622 page", url: "https://www.suse.com/security/cve/CVE-2016-8622/", }, { category: "self", summary: "SUSE CVE CVE-2016-8623 page", url: "https://www.suse.com/security/cve/CVE-2016-8623/", }, { category: "self", summary: "SUSE CVE CVE-2016-8624 page", url: "https://www.suse.com/security/cve/CVE-2016-8624/", }, { category: "self", summary: "SUSE CVE CVE-2016-9063 page", url: "https://www.suse.com/security/cve/CVE-2016-9063/", }, { category: "self", summary: "SUSE CVE CVE-2016-9318 page", url: "https://www.suse.com/security/cve/CVE-2016-9318/", }, { category: "self", summary: "SUSE CVE CVE-2016-9586 page", url: "https://www.suse.com/security/cve/CVE-2016-9586/", }, { category: "self", summary: "SUSE CVE CVE-2016-9597 page", url: "https://www.suse.com/security/cve/CVE-2016-9597/", }, { category: "self", summary: "SUSE CVE CVE-2016-9840 page", url: "https://www.suse.com/security/cve/CVE-2016-9840/", }, { category: "self", summary: "SUSE CVE CVE-2016-9841 page", url: "https://www.suse.com/security/cve/CVE-2016-9841/", }, { category: "self", summary: "SUSE CVE CVE-2016-9842 page", url: "https://www.suse.com/security/cve/CVE-2016-9842/", }, { category: "self", summary: "SUSE CVE CVE-2016-9843 page", url: "https://www.suse.com/security/cve/CVE-2016-9843/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000100 page", url: "https://www.suse.com/security/cve/CVE-2017-1000100/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000101 page", url: "https://www.suse.com/security/cve/CVE-2017-1000101/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000366 page", url: "https://www.suse.com/security/cve/CVE-2017-1000366/", }, { category: "self", summary: "SUSE CVE CVE-2017-10684 page", url: "https://www.suse.com/security/cve/CVE-2017-10684/", }, { category: "self", summary: "SUSE CVE CVE-2017-10685 page", url: "https://www.suse.com/security/cve/CVE-2017-10685/", }, { category: "self", summary: "SUSE CVE CVE-2017-11112 page", url: "https://www.suse.com/security/cve/CVE-2017-11112/", }, { category: "self", summary: "SUSE CVE CVE-2017-11113 page", url: "https://www.suse.com/security/cve/CVE-2017-11113/", }, { category: "self", summary: "SUSE CVE CVE-2017-2616 page", url: "https://www.suse.com/security/cve/CVE-2017-2616/", }, { category: "self", summary: "SUSE CVE CVE-2017-3731 page", url: "https://www.suse.com/security/cve/CVE-2017-3731/", }, { category: "self", summary: "SUSE CVE CVE-2017-6507 page", url: "https://www.suse.com/security/cve/CVE-2017-6507/", }, { category: "self", summary: "SUSE CVE CVE-2017-7407 page", url: "https://www.suse.com/security/cve/CVE-2017-7407/", }, { category: "self", summary: "SUSE CVE CVE-2017-7526 page", url: "https://www.suse.com/security/cve/CVE-2017-7526/", }, { category: "self", summary: "SUSE CVE CVE-2017-9047 page", url: "https://www.suse.com/security/cve/CVE-2017-9047/", }, { category: "self", summary: "SUSE CVE CVE-2017-9048 page", url: "https://www.suse.com/security/cve/CVE-2017-9048/", }, { category: "self", summary: "SUSE CVE CVE-2017-9049 page", url: "https://www.suse.com/security/cve/CVE-2017-9049/", }, { category: "self", summary: "SUSE CVE CVE-2017-9050 page", url: "https://www.suse.com/security/cve/CVE-2017-9050/", }, { category: "self", summary: "SUSE CVE CVE-2017-9233 page", url: "https://www.suse.com/security/cve/CVE-2017-9233/", }, ], title: "Security update for SLES 12-SP1 Docker image", tracking: { current_release_date: "2017-10-10T19:37:36Z", generator: { date: "2017-10-10T19:37:36Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2017:2700-1", initial_release_date: "2017-10-10T19:37:36Z", revision_history: [ { date: "2017-10-10T19:37:36Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "sles12sp1-docker-image-1.0.7-20171002.ppc64le", product: { name: "sles12sp1-docker-image-1.0.7-20171002.ppc64le", product_id: "sles12sp1-docker-image-1.0.7-20171002.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "sles12sp1-docker-image-1.0.7-20171002.s390x", product: { name: "sles12sp1-docker-image-1.0.7-20171002.s390x", product_id: "sles12sp1-docker-image-1.0.7-20171002.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "sles12sp1-docker-image-1.0.7-20171002.x86_64", product: { name: "sles12sp1-docker-image-1.0.7-20171002.x86_64", product_id: "sles12sp1-docker-image-1.0.7-20171002.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Containers 12", product: { name: "SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-containers:12", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "sles12sp1-docker-image-1.0.7-20171002.ppc64le as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", }, product_reference: "sles12sp1-docker-image-1.0.7-20171002.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "sles12sp1-docker-image-1.0.7-20171002.s390x as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", }, product_reference: "sles12sp1-docker-image-1.0.7-20171002.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "sles12sp1-docker-image-1.0.7-20171002.x86_64 as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", }, product_reference: "sles12sp1-docker-image-1.0.7-20171002.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, ], }, vulnerabilities: [ { cve: "CVE-2012-6702", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-6702", }, ], notes: [ { category: "general", text: "Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-6702", url: "https://www.suse.com/security/cve/CVE-2012-6702", }, { category: "external", summary: "SUSE Bug 983215 for CVE-2012-6702", url: "https://bugzilla.suse.com/983215", }, { category: "external", summary: "SUSE Bug 983216 for CVE-2012-6702", url: "https://bugzilla.suse.com/983216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2012-6702", }, { cve: "CVE-2014-0191", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-0191", }, ], notes: [ { category: "general", text: "The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-0191", url: "https://www.suse.com/security/cve/CVE-2014-0191", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2014-0191", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2014-0191", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 876652 for CVE-2014-0191", url: "https://bugzilla.suse.com/876652", }, { category: "external", summary: "SUSE Bug 877506 for CVE-2014-0191", url: "https://bugzilla.suse.com/877506", }, { category: "external", summary: "SUSE Bug 996079 for CVE-2014-0191", url: "https://bugzilla.suse.com/996079", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2014-0191", }, { cve: "CVE-2014-6271", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6271", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6271", url: "https://www.suse.com/security/cve/CVE-2014-6271", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-6271", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 1130324 for CVE-2014-6271", url: "https://bugzilla.suse.com/1130324", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2014-6271", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 896776 for CVE-2014-6271", url: "https://bugzilla.suse.com/896776", }, { category: "external", summary: "SUSE Bug 898346 for CVE-2014-6271", url: "https://bugzilla.suse.com/898346", }, { category: "external", summary: "SUSE Bug 898604 for CVE-2014-6271", url: "https://bugzilla.suse.com/898604", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6271", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6271", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6271", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-6271", url: "https://bugzilla.suse.com/900454", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2014-6271", }, { cve: "CVE-2014-6277", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6277", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6277", url: "https://www.suse.com/security/cve/CVE-2014-6277", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6277", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6277", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6277", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-6277", url: "https://bugzilla.suse.com/900454", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2014-6277", }, { cve: "CVE-2014-6278", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6278", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6278", url: "https://www.suse.com/security/cve/CVE-2014-6278", }, { category: "external", summary: "SUSE Bug 898604 for CVE-2014-6278", url: "https://bugzilla.suse.com/898604", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6278", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6278", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6278", url: "https://bugzilla.suse.com/900127", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2014-6278", }, { cve: "CVE-2014-7169", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7169", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7169", url: "https://www.suse.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-7169", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 1130324 for CVE-2014-7169", url: "https://bugzilla.suse.com/1130324", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2014-7169", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 896776 for CVE-2014-7169", url: "https://bugzilla.suse.com/896776", }, { category: "external", summary: "SUSE Bug 898346 for CVE-2014-7169", url: "https://bugzilla.suse.com/898346", }, { category: "external", summary: "SUSE Bug 898762 for CVE-2014-7169", url: "https://bugzilla.suse.com/898762", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-7169", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-7169", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 899039 for CVE-2014-7169", url: "https://bugzilla.suse.com/899039", }, { category: "external", summary: "SUSE Bug 899266 for CVE-2014-7169", url: "https://bugzilla.suse.com/899266", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-7169", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-7169", url: "https://bugzilla.suse.com/900454", }, { category: "external", summary: "SUSE Bug 902237 for CVE-2014-7169", url: "https://bugzilla.suse.com/902237", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2014-7169", }, { cve: "CVE-2014-7187", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7187", }, ], notes: [ { category: "general", text: "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7187", url: "https://www.suse.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-7187", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 898603 for CVE-2014-7187", url: "https://bugzilla.suse.com/898603", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-7187", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-7187", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 899039 for CVE-2014-7187", url: "https://bugzilla.suse.com/899039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2014-7187", }, { cve: "CVE-2014-7824", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7824", }, ], notes: [ { category: "general", text: "D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7824", url: "https://www.suse.com/security/cve/CVE-2014-7824", }, { category: "external", summary: "SUSE Bug 904017 for CVE-2014-7824", url: "https://bugzilla.suse.com/904017", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2014-7824", }, { cve: "CVE-2014-8964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-8964", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-8964", url: "https://www.suse.com/security/cve/CVE-2014-8964", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2014-8964", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 924960 for CVE-2014-8964", url: "https://bugzilla.suse.com/924960", }, { category: "external", summary: "SUSE Bug 933288 for CVE-2014-8964", url: "https://bugzilla.suse.com/933288", }, { category: "external", summary: "SUSE Bug 936408 for CVE-2014-8964", url: "https://bugzilla.suse.com/936408", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2014-8964", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2014-8964", }, { cve: "CVE-2014-9770", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9770", }, ], notes: [ { category: "general", text: "tmpfiles.d/systemd.conf in systemd before 214 uses weak permissions for journal files under (1) /run/log/journal/%m and (2) /var/log/journal/%m, which allows local users to obtain sensitive information by reading these files.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9770", url: "https://www.suse.com/security/cve/CVE-2014-9770", }, { category: "external", summary: "SUSE Bug 972612 for CVE-2014-9770", url: "https://bugzilla.suse.com/972612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2014-9770", }, { cve: "CVE-2015-0245", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0245", }, ], notes: [ { category: "general", text: "D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0245", url: "https://www.suse.com/security/cve/CVE-2015-0245", }, { category: "external", summary: "SUSE Bug 1003898 for CVE-2015-0245", url: "https://bugzilla.suse.com/1003898", }, { category: "external", summary: "SUSE Bug 916343 for CVE-2015-0245", url: "https://bugzilla.suse.com/916343", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2015-0245", }, { cve: "CVE-2015-0860", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0860", }, ], notes: [ { category: "general", text: "Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an \"old-style\" Debian binary package, which triggers a stack-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0860", url: "https://www.suse.com/security/cve/CVE-2015-0860", }, { category: "external", summary: "SUSE Bug 957160 for CVE-2015-0860", url: "https://bugzilla.suse.com/957160", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-0860", }, { cve: "CVE-2015-1283", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-1283", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-1283", url: "https://www.suse.com/security/cve/CVE-2015-1283", }, { category: "external", summary: "SUSE Bug 1034050 for CVE-2015-1283", url: "https://bugzilla.suse.com/1034050", }, { category: "external", summary: "SUSE Bug 939077 for CVE-2015-1283", url: "https://bugzilla.suse.com/939077", }, { category: "external", summary: "SUSE Bug 979441 for CVE-2015-1283", url: "https://bugzilla.suse.com/979441", }, { category: "external", summary: "SUSE Bug 980391 for CVE-2015-1283", url: "https://bugzilla.suse.com/980391", }, { category: "external", summary: "SUSE Bug 983985 for CVE-2015-1283", url: "https://bugzilla.suse.com/983985", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-1283", }, { cve: "CVE-2015-2059", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2059", }, ], notes: [ { category: "general", text: "The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2059", url: "https://www.suse.com/security/cve/CVE-2015-2059", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2015-2059", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 919214 for CVE-2015-2059", url: "https://bugzilla.suse.com/919214", }, { category: "external", summary: "SUSE Bug 923241 for CVE-2015-2059", url: "https://bugzilla.suse.com/923241", }, { category: "external", summary: "SUSE Bug 937096 for CVE-2015-2059", url: "https://bugzilla.suse.com/937096", }, { category: "external", summary: "SUSE Bug 937097 for CVE-2015-2059", url: "https://bugzilla.suse.com/937097", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2015-2059", }, { cve: "CVE-2015-2325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2325", }, ], notes: [ { category: "general", text: "The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2325", url: "https://www.suse.com/security/cve/CVE-2015-2325", }, { category: "external", summary: "SUSE Bug 924960 for CVE-2015-2325", url: "https://bugzilla.suse.com/924960", }, { category: "external", summary: "SUSE Bug 933288 for CVE-2015-2325", url: "https://bugzilla.suse.com/933288", }, { category: "external", summary: "SUSE Bug 936408 for CVE-2015-2325", url: "https://bugzilla.suse.com/936408", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-2325", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-2325", }, { cve: "CVE-2015-2327", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2327", }, ], notes: [ { category: "general", text: "PCRE before 8.36 mishandles the /(((a\\2)|(a*)\\g<-1>))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2327", url: "https://www.suse.com/security/cve/CVE-2015-2327", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-2327", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957567 for CVE-2015-2327", url: "https://bugzilla.suse.com/957567", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-2327", }, { cve: "CVE-2015-2328", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2328", }, ], notes: [ { category: "general", text: "PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2328", url: "https://www.suse.com/security/cve/CVE-2015-2328", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-2328", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957600 for CVE-2015-2328", url: "https://bugzilla.suse.com/957600", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-2328", }, { cve: "CVE-2015-3210", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3210", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3210", url: "https://www.suse.com/security/cve/CVE-2015-3210", }, { category: "external", summary: "SUSE Bug 933288 for CVE-2015-3210", url: "https://bugzilla.suse.com/933288", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-3210", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-3210", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2015-3210", }, { cve: "CVE-2015-3217", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3217", }, ], notes: [ { category: "general", text: "PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\\\.|([^\\\\\\\\W_])?)+)+$/.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3217", url: "https://www.suse.com/security/cve/CVE-2015-3217", }, { category: "external", summary: "SUSE Bug 933878 for CVE-2015-3217", url: "https://bugzilla.suse.com/933878", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-3217", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-3217", }, { cve: "CVE-2015-3238", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3238", }, ], notes: [ { category: "general", text: "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3238", url: "https://www.suse.com/security/cve/CVE-2015-3238", }, { category: "external", summary: "SUSE Bug 1123794 for CVE-2015-3238", url: "https://bugzilla.suse.com/1123794", }, { category: "external", summary: "SUSE Bug 934920 for CVE-2015-3238", url: "https://bugzilla.suse.com/934920", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-3238", }, { cve: "CVE-2015-3622", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3622", }, ], notes: [ { category: "general", text: "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3622", url: "https://www.suse.com/security/cve/CVE-2015-3622", }, { category: "external", summary: "SUSE Bug 929414 for CVE-2015-3622", url: "https://bugzilla.suse.com/929414", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2015-3622", }, { cve: "CVE-2015-5073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-5073", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-5073", url: "https://www.suse.com/security/cve/CVE-2015-5073", }, { category: "external", summary: "SUSE Bug 936227 for CVE-2015-5073", url: "https://bugzilla.suse.com/936227", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-5073", }, { cve: "CVE-2015-5276", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-5276", }, ], notes: [ { category: "general", text: "The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-5276", url: "https://www.suse.com/security/cve/CVE-2015-5276", }, { category: "external", summary: "SUSE Bug 945842 for CVE-2015-5276", url: "https://bugzilla.suse.com/945842", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-5276", }, { cve: "CVE-2015-7511", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-7511", }, ], notes: [ { category: "general", text: "Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-7511", url: "https://www.suse.com/security/cve/CVE-2015-7511", }, { category: "external", summary: "SUSE Bug 965902 for CVE-2015-7511", url: "https://bugzilla.suse.com/965902", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-7511", }, { cve: "CVE-2015-8380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8380", }, ], notes: [ { category: "general", text: "The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \\01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8380", url: "https://www.suse.com/security/cve/CVE-2015-8380", }, { category: "external", summary: "SUSE Bug 957566 for CVE-2015-8380", url: "https://bugzilla.suse.com/957566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2015-8380", }, { cve: "CVE-2015-8381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8381", }, ], notes: [ { category: "general", text: "The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?'R')(\\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and /(?J:(?|(:(?|(?'R')(\\z(?|(?'R')(\\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8381", url: "https://www.suse.com/security/cve/CVE-2015-8381", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8381", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8381", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8381", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-8381", }, { cve: "CVE-2015-8382", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8382", }, ], notes: [ { category: "general", text: "The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8382", url: "https://www.suse.com/security/cve/CVE-2015-8382", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8382", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8382", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8382", }, { cve: "CVE-2015-8383", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8383", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8383", url: "https://www.suse.com/security/cve/CVE-2015-8383", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8383", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8383", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8383", }, { cve: "CVE-2015-8384", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8384", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8384", url: "https://www.suse.com/security/cve/CVE-2015-8384", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8384", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8384", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8384", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8384", }, { cve: "CVE-2015-8385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8385", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?|(\\k'Pm')|(?'Pm'))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8385", url: "https://www.suse.com/security/cve/CVE-2015-8385", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8385", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8385", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8385", }, { cve: "CVE-2015-8386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8386", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8386", url: "https://www.suse.com/security/cve/CVE-2015-8386", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8386", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8386", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8386", }, { cve: "CVE-2015-8387", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8387", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8387", url: "https://www.suse.com/security/cve/CVE-2015-8387", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8387", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8387", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8387", }, { cve: "CVE-2015-8388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8388", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8388", url: "https://www.suse.com/security/cve/CVE-2015-8388", }, { category: "external", summary: "SUSE Bug 936227 for CVE-2015-8388", url: "https://bugzilla.suse.com/936227", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8388", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8388", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8388", }, { cve: "CVE-2015-8389", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8389", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8389", url: "https://www.suse.com/security/cve/CVE-2015-8389", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8389", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8389", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8389", }, { cve: "CVE-2015-8390", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8390", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the [: and \\\\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8390", url: "https://www.suse.com/security/cve/CVE-2015-8390", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8390", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8390", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8390", }, { cve: "CVE-2015-8391", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8391", }, ], notes: [ { category: "general", text: "The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8391", url: "https://www.suse.com/security/cve/CVE-2015-8391", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8391", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8391", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8391", }, { cve: "CVE-2015-8392", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8392", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles certain instances of the (?| substring, which allows remote attackers to cause a denial of service (unintended recursion and buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8395.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8392", url: "https://www.suse.com/security/cve/CVE-2015-8392", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8392", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8392", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8392", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-8392", }, { cve: "CVE-2015-8393", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8393", }, ], notes: [ { category: "general", text: "pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8393", url: "https://www.suse.com/security/cve/CVE-2015-8393", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8393", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8393", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8393", }, { cve: "CVE-2015-8394", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8394", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the (?(<digits>) and (?(R<digits>) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8394", url: "https://www.suse.com/security/cve/CVE-2015-8394", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8394", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8394", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8394", }, { cve: "CVE-2015-8395", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8395", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles certain references, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8392.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8395", url: "https://www.suse.com/security/cve/CVE-2015-8395", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8395", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8395", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8395", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8395", }, { cve: "CVE-2015-8806", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8806", }, ], notes: [ { category: "general", text: "dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the \"<!DOCTYPE html\" substring in a crafted HTML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8806", url: "https://www.suse.com/security/cve/CVE-2015-8806", }, { category: "external", summary: "SUSE Bug 963963 for CVE-2015-8806", url: "https://bugzilla.suse.com/963963", }, { category: "external", summary: "SUSE Bug 965283 for CVE-2015-8806", url: "https://bugzilla.suse.com/965283", }, { category: "external", summary: "SUSE Bug 981114 for CVE-2015-8806", url: "https://bugzilla.suse.com/981114", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-8806", }, { cve: "CVE-2015-8842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8842", }, ], notes: [ { category: "general", text: "tmpfiles.d/systemd.conf in systemd before 229 uses weak permissions for /var/log/journal/%m/system.journal, which allows local users to obtain sensitive information by reading the file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8842", url: "https://www.suse.com/security/cve/CVE-2015-8842", }, { category: "external", summary: "SUSE Bug 972612 for CVE-2015-8842", url: "https://bugzilla.suse.com/972612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-8842", }, { cve: "CVE-2015-8853", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8853", }, ], notes: [ { category: "general", text: "The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by \"a\\x80.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8853", url: "https://www.suse.com/security/cve/CVE-2015-8853", }, { category: "external", summary: "SUSE Bug 976584 for CVE-2015-8853", url: "https://bugzilla.suse.com/976584", }, { category: "external", summary: "SUSE Bug 997948 for CVE-2015-8853", url: "https://bugzilla.suse.com/997948", }, { category: "external", summary: "SUSE Bug 997950 for CVE-2015-8853", url: "https://bugzilla.suse.com/997950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-8853", }, { cve: "CVE-2015-8948", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8948", }, ], notes: [ { category: "general", text: "idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8948", url: "https://www.suse.com/security/cve/CVE-2015-8948", }, { category: "external", summary: "SUSE Bug 1014473 for CVE-2015-8948", url: "https://bugzilla.suse.com/1014473", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2015-8948", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 1190777 for CVE-2015-8948", url: "https://bugzilla.suse.com/1190777", }, { category: "external", summary: "SUSE Bug 990189 for CVE-2015-8948", url: "https://bugzilla.suse.com/990189", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-8948", }, { cve: "CVE-2016-0634", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0634", }, ], notes: [ { category: "general", text: "The expansion of '\\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0634", url: "https://www.suse.com/security/cve/CVE-2016-0634", }, { category: "external", summary: "SUSE Bug 1000396 for CVE-2016-0634", url: "https://bugzilla.suse.com/1000396", }, { category: "external", summary: "SUSE Bug 1001299 for CVE-2016-0634", url: "https://bugzilla.suse.com/1001299", }, { category: "external", summary: "SUSE Bug 1159416 for CVE-2016-0634", url: "https://bugzilla.suse.com/1159416", }, { category: "external", summary: "SUSE Bug 1188388 for CVE-2016-0634", url: "https://bugzilla.suse.com/1188388", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-0634", }, { cve: "CVE-2016-0718", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0718", }, ], notes: [ { category: "general", text: "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0718", url: "https://www.suse.com/security/cve/CVE-2016-0718", }, { category: "external", summary: "SUSE Bug 979441 for CVE-2016-0718", url: "https://bugzilla.suse.com/979441", }, { category: "external", summary: "SUSE Bug 991809 for CVE-2016-0718", url: "https://bugzilla.suse.com/991809", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-0718", }, { cve: "CVE-2016-0787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0787", }, ], notes: [ { category: "general", text: "The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a \"bits/bytes confusion bug.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0787", url: "https://www.suse.com/security/cve/CVE-2016-0787", }, { category: "external", summary: "SUSE Bug 1149968 for CVE-2016-0787", url: "https://bugzilla.suse.com/1149968", }, { category: "external", summary: "SUSE Bug 967026 for CVE-2016-0787", url: "https://bugzilla.suse.com/967026", }, { category: "external", summary: "SUSE Bug 968174 for CVE-2016-0787", url: "https://bugzilla.suse.com/968174", }, { category: "external", summary: "SUSE Bug 974691 for CVE-2016-0787", url: "https://bugzilla.suse.com/974691", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-0787", }, { cve: "CVE-2016-1234", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1234", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1234", url: "https://www.suse.com/security/cve/CVE-2016-1234", }, { category: "external", summary: "SUSE Bug 1020940 for CVE-2016-1234", url: "https://bugzilla.suse.com/1020940", }, { category: "external", summary: "SUSE Bug 969727 for CVE-2016-1234", url: "https://bugzilla.suse.com/969727", }, { category: "external", summary: "SUSE Bug 988770 for CVE-2016-1234", url: "https://bugzilla.suse.com/988770", }, { category: "external", summary: "SUSE Bug 988782 for CVE-2016-1234", url: "https://bugzilla.suse.com/988782", }, { category: "external", summary: "SUSE Bug 989127 for CVE-2016-1234", url: "https://bugzilla.suse.com/989127", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-1234", }, { cve: "CVE-2016-1238", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1238", }, ], notes: [ { category: "general", text: "(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1238", url: "https://www.suse.com/security/cve/CVE-2016-1238", }, { category: "external", summary: "SUSE Bug 1108749 for CVE-2016-1238", url: "https://bugzilla.suse.com/1108749", }, { category: "external", summary: "SUSE Bug 1123389 for CVE-2016-1238", url: "https://bugzilla.suse.com/1123389", }, { category: "external", summary: "SUSE Bug 987887 for CVE-2016-1238", url: "https://bugzilla.suse.com/987887", }, { category: "external", summary: "SUSE Bug 988311 for CVE-2016-1238", url: "https://bugzilla.suse.com/988311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-1238", }, { cve: "CVE-2016-1283", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1283", }, ], notes: [ { category: "general", text: "The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\\\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\\){97)?J)?J)(?'R'(?'R'\\){99|(:(?|(?'R')(\\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1283", url: "https://www.suse.com/security/cve/CVE-2016-1283", }, { category: "external", summary: "SUSE Bug 960837 for CVE-2016-1283", url: "https://bugzilla.suse.com/960837", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2016-1283", }, { cve: "CVE-2016-1762", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1762", }, ], notes: [ { category: "general", text: "The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1762", url: "https://www.suse.com/security/cve/CVE-2016-1762", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1762", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981040 for CVE-2016-1762", url: "https://bugzilla.suse.com/981040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-1762", }, { cve: "CVE-2016-1833", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1833", }, ], notes: [ { category: "general", text: "The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1833", url: "https://www.suse.com/security/cve/CVE-2016-1833", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1833", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981108 for CVE-2016-1833", url: "https://bugzilla.suse.com/981108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-1833", }, { cve: "CVE-2016-1834", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1834", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1834", url: "https://www.suse.com/security/cve/CVE-2016-1834", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1834", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981041 for CVE-2016-1834", url: "https://bugzilla.suse.com/981041", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-1834", }, { cve: "CVE-2016-1835", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1835", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1835", url: "https://www.suse.com/security/cve/CVE-2016-1835", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1835", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981109 for CVE-2016-1835", url: "https://bugzilla.suse.com/981109", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-1835", }, { cve: "CVE-2016-1837", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1837", }, ], notes: [ { category: "general", text: "Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1837", url: "https://www.suse.com/security/cve/CVE-2016-1837", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1837", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981111 for CVE-2016-1837", url: "https://bugzilla.suse.com/981111", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-1837", }, { cve: "CVE-2016-1838", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1838", }, ], notes: [ { category: "general", text: "The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1838", url: "https://www.suse.com/security/cve/CVE-2016-1838", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1838", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981112 for CVE-2016-1838", url: "https://bugzilla.suse.com/981112", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-1838", }, { cve: "CVE-2016-1839", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1839", }, ], notes: [ { category: "general", text: "The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1839", url: "https://www.suse.com/security/cve/CVE-2016-1839", }, { category: "external", summary: "SUSE Bug 1039069 for CVE-2016-1839", url: "https://bugzilla.suse.com/1039069", }, { category: "external", summary: "SUSE Bug 1039661 for CVE-2016-1839", url: "https://bugzilla.suse.com/1039661", }, { category: "external", summary: "SUSE Bug 1069433 for CVE-2016-1839", url: "https://bugzilla.suse.com/1069433", }, { category: "external", summary: "SUSE Bug 1069690 for CVE-2016-1839", url: "https://bugzilla.suse.com/1069690", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1839", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 963963 for CVE-2016-1839", url: "https://bugzilla.suse.com/963963", }, { category: "external", summary: "SUSE Bug 981114 for CVE-2016-1839", url: "https://bugzilla.suse.com/981114", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-1839", }, { cve: "CVE-2016-1840", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1840", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1840", url: "https://www.suse.com/security/cve/CVE-2016-1840", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1840", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981115 for CVE-2016-1840", url: "https://bugzilla.suse.com/981115", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-1840", }, { cve: "CVE-2016-2037", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2037", }, ], notes: [ { category: "general", text: "The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2037", url: "https://www.suse.com/security/cve/CVE-2016-2037", }, { category: "external", summary: "SUSE Bug 1028410 for CVE-2016-2037", url: "https://bugzilla.suse.com/1028410", }, { category: "external", summary: "SUSE Bug 963448 for CVE-2016-2037", url: "https://bugzilla.suse.com/963448", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-2037", }, { cve: "CVE-2016-2073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2073", }, ], notes: [ { category: "general", text: "The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2073", url: "https://www.suse.com/security/cve/CVE-2016-2073", }, { category: "external", summary: "SUSE Bug 963963 for CVE-2016-2073", url: "https://bugzilla.suse.com/963963", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-2073", }, { cve: "CVE-2016-2105", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2105", }, ], notes: [ { category: "general", text: "Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2105", url: "https://www.suse.com/security/cve/CVE-2016-2105", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2105", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977614 for CVE-2016-2105", url: "https://bugzilla.suse.com/977614", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2105", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 989902 for CVE-2016-2105", url: "https://bugzilla.suse.com/989902", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2105", url: "https://bugzilla.suse.com/990369", }, { category: "external", summary: "SUSE Bug 990370 for CVE-2016-2105", url: "https://bugzilla.suse.com/990370", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-2105", }, { cve: "CVE-2016-2106", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2106", }, ], notes: [ { category: "general", text: "Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2106", url: "https://www.suse.com/security/cve/CVE-2016-2106", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2106", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977615 for CVE-2016-2106", url: "https://bugzilla.suse.com/977615", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2106", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 979279 for CVE-2016-2106", url: "https://bugzilla.suse.com/979279", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2106", url: "https://bugzilla.suse.com/990369", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-2106", }, { cve: "CVE-2016-2107", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2107", }, ], notes: [ { category: "general", text: "The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2107", url: "https://www.suse.com/security/cve/CVE-2016-2107", }, { category: "external", summary: "SUSE Bug 976942 for CVE-2016-2107", url: "https://bugzilla.suse.com/976942", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2107", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977616 for CVE-2016-2107", url: "https://bugzilla.suse.com/977616", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2107", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2107", url: "https://bugzilla.suse.com/990369", }, { category: "external", summary: "SUSE Bug 990370 for CVE-2016-2107", url: "https://bugzilla.suse.com/990370", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-2107", }, { cve: "CVE-2016-2108", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2108", }, ], notes: [ { category: "general", text: "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2108", url: "https://www.suse.com/security/cve/CVE-2016-2108", }, { category: "external", summary: "SUSE Bug 1001502 for CVE-2016-2108", url: "https://bugzilla.suse.com/1001502", }, { category: "external", summary: "SUSE Bug 1004499 for CVE-2016-2108", url: "https://bugzilla.suse.com/1004499", }, { category: "external", summary: "SUSE Bug 1005878 for CVE-2016-2108", url: "https://bugzilla.suse.com/1005878", }, { category: "external", summary: "SUSE Bug 1148697 for CVE-2016-2108", url: "https://bugzilla.suse.com/1148697", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2108", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977617 for CVE-2016-2108", url: "https://bugzilla.suse.com/977617", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2108", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 989345 for CVE-2016-2108", url: "https://bugzilla.suse.com/989345", }, { category: "external", summary: "SUSE Bug 996067 for CVE-2016-2108", url: "https://bugzilla.suse.com/996067", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-2108", }, { cve: "CVE-2016-2109", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2109", }, ], notes: [ { category: "general", text: "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2109", url: "https://www.suse.com/security/cve/CVE-2016-2109", }, { category: "external", summary: "SUSE Bug 1015243 for CVE-2016-2109", url: "https://bugzilla.suse.com/1015243", }, { category: "external", summary: "SUSE Bug 976942 for CVE-2016-2109", url: "https://bugzilla.suse.com/976942", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2109", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2109", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2109", url: "https://bugzilla.suse.com/990369", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-2109", }, { cve: "CVE-2016-2177", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2177", }, ], notes: [ { category: "general", text: "OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2177", url: "https://www.suse.com/security/cve/CVE-2016-2177", }, { category: "external", summary: "SUSE Bug 982575 for CVE-2016-2177", url: "https://bugzilla.suse.com/982575", }, { category: "external", summary: "SUSE Bug 999075 for CVE-2016-2177", url: "https://bugzilla.suse.com/999075", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2177", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-2177", }, { cve: "CVE-2016-2178", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2178", }, ], notes: [ { category: "general", text: "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2178", url: "https://www.suse.com/security/cve/CVE-2016-2178", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2178", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 983249 for CVE-2016-2178", url: "https://bugzilla.suse.com/983249", }, { category: "external", summary: "SUSE Bug 983519 for CVE-2016-2178", url: "https://bugzilla.suse.com/983519", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2178", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-2178", }, { cve: "CVE-2016-2179", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2179", }, ], notes: [ { category: "general", text: "The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2179", url: "https://www.suse.com/security/cve/CVE-2016-2179", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2179", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2179", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2179", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-2179", }, { cve: "CVE-2016-2180", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2180", }, ], notes: [ { category: "general", text: "The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the \"openssl ts\" command.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2180", url: "https://www.suse.com/security/cve/CVE-2016-2180", }, { category: "external", summary: "SUSE Bug 1003811 for CVE-2016-2180", url: "https://bugzilla.suse.com/1003811", }, { category: "external", summary: "SUSE Bug 990419 for CVE-2016-2180", url: "https://bugzilla.suse.com/990419", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2180", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-2180", }, { cve: "CVE-2016-2181", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2181", }, ], notes: [ { category: "general", text: "The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2181", url: "https://www.suse.com/security/cve/CVE-2016-2181", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2181", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 994749 for CVE-2016-2181", url: "https://bugzilla.suse.com/994749", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2181", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2181", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-2181", }, { cve: "CVE-2016-2182", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2182", }, ], notes: [ { category: "general", text: "The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2182", url: "https://www.suse.com/security/cve/CVE-2016-2182", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2182", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 993819 for CVE-2016-2182", url: "https://bugzilla.suse.com/993819", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2182", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995959 for CVE-2016-2182", url: "https://bugzilla.suse.com/995959", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2182", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-2182", }, { cve: "CVE-2016-2183", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2183", }, ], notes: [ { category: "general", text: "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2183", url: "https://www.suse.com/security/cve/CVE-2016-2183", }, { category: "external", summary: "SUSE Bug 1001912 for CVE-2016-2183", url: "https://bugzilla.suse.com/1001912", }, { category: "external", summary: "SUSE Bug 1024218 for CVE-2016-2183", url: "https://bugzilla.suse.com/1024218", }, { category: "external", summary: "SUSE Bug 1027038 for CVE-2016-2183", url: "https://bugzilla.suse.com/1027038", }, { category: "external", summary: "SUSE Bug 1034689 for CVE-2016-2183", url: "https://bugzilla.suse.com/1034689", }, { category: "external", summary: "SUSE Bug 1056614 for CVE-2016-2183", url: "https://bugzilla.suse.com/1056614", }, { category: "external", summary: "SUSE Bug 1171693 for CVE-2016-2183", url: "https://bugzilla.suse.com/1171693", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2183", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995359 for CVE-2016-2183", url: "https://bugzilla.suse.com/995359", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-2183", }, { cve: "CVE-2016-2381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2381", }, ], notes: [ { category: "general", text: "Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2381", url: "https://www.suse.com/security/cve/CVE-2016-2381", }, { category: "external", summary: "SUSE Bug 967082 for CVE-2016-2381", url: "https://bugzilla.suse.com/967082", }, { category: "external", summary: "SUSE Bug 992991 for CVE-2016-2381", url: "https://bugzilla.suse.com/992991", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-2381", }, { cve: "CVE-2016-3075", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3075", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3075", url: "https://www.suse.com/security/cve/CVE-2016-3075", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2016-3075", url: "https://bugzilla.suse.com/1123874", }, { category: "external", summary: "SUSE Bug 973164 for CVE-2016-3075", url: "https://bugzilla.suse.com/973164", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-3075", }, { cve: "CVE-2016-3191", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3191", }, ], notes: [ { category: "general", text: "The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3191", url: "https://www.suse.com/security/cve/CVE-2016-3191", }, { category: "external", summary: "SUSE Bug 971741 for CVE-2016-3191", url: "https://bugzilla.suse.com/971741", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-3191", }, { cve: "CVE-2016-3627", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3627", }, ], notes: [ { category: "general", text: "The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3627", url: "https://www.suse.com/security/cve/CVE-2016-3627", }, { category: "external", summary: "SUSE Bug 1026099 for CVE-2016-3627", url: "https://bugzilla.suse.com/1026099", }, { category: "external", summary: "SUSE Bug 1026101 for CVE-2016-3627", url: "https://bugzilla.suse.com/1026101", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-3627", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 972335 for CVE-2016-3627", url: "https://bugzilla.suse.com/972335", }, { category: "external", summary: "SUSE Bug 975947 for CVE-2016-3627", url: "https://bugzilla.suse.com/975947", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-3627", }, { cve: "CVE-2016-3705", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3705", }, ], notes: [ { category: "general", text: "The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3705", url: "https://www.suse.com/security/cve/CVE-2016-3705", }, { category: "external", summary: "SUSE Bug 1017497 for CVE-2016-3705", url: "https://bugzilla.suse.com/1017497", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-3705", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 975947 for CVE-2016-3705", url: "https://bugzilla.suse.com/975947", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-3705", }, { cve: "CVE-2016-3706", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3706", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3706", url: "https://www.suse.com/security/cve/CVE-2016-3706", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2016-3706", url: "https://bugzilla.suse.com/1123874", }, { category: "external", summary: "SUSE Bug 980483 for CVE-2016-3706", url: "https://bugzilla.suse.com/980483", }, { category: "external", summary: "SUSE Bug 997423 for CVE-2016-3706", url: "https://bugzilla.suse.com/997423", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-3706", }, { cve: "CVE-2016-4008", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4008", }, ], notes: [ { category: "general", text: "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4008", url: "https://www.suse.com/security/cve/CVE-2016-4008", }, { category: "external", summary: "SUSE Bug 982779 for CVE-2016-4008", url: "https://bugzilla.suse.com/982779", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-4008", }, { cve: "CVE-2016-4429", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4429", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4429", url: "https://www.suse.com/security/cve/CVE-2016-4429", }, { category: "external", summary: "SUSE Bug 1081556 for CVE-2016-4429", url: "https://bugzilla.suse.com/1081556", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2016-4429", url: "https://bugzilla.suse.com/1123874", }, { category: "external", summary: "SUSE Bug 980854 for CVE-2016-4429", url: "https://bugzilla.suse.com/980854", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-4429", }, { cve: "CVE-2016-4447", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4447", }, ], notes: [ { category: "general", text: "The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4447", url: "https://www.suse.com/security/cve/CVE-2016-4447", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4447", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981548 for CVE-2016-4447", url: "https://bugzilla.suse.com/981548", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-4447", }, { cve: "CVE-2016-4448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4448", }, ], notes: [ { category: "general", text: "Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4448", url: "https://www.suse.com/security/cve/CVE-2016-4448", }, { category: "external", summary: "SUSE Bug 1010299 for CVE-2016-4448", url: "https://bugzilla.suse.com/1010299", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4448", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981549 for CVE-2016-4448", url: "https://bugzilla.suse.com/981549", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-4448", }, { cve: "CVE-2016-4449", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4449", }, ], notes: [ { category: "general", text: "XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4449", url: "https://www.suse.com/security/cve/CVE-2016-4449", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4449", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981550 for CVE-2016-4449", url: "https://bugzilla.suse.com/981550", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-4449", }, { cve: "CVE-2016-4483", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4483", }, ], notes: [ { category: "general", text: "The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4483", url: "https://www.suse.com/security/cve/CVE-2016-4483", }, { category: "external", summary: "SUSE Bug 1026101 for CVE-2016-4483", url: "https://bugzilla.suse.com/1026101", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4483", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 978395 for CVE-2016-4483", url: "https://bugzilla.suse.com/978395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-4483", }, { cve: "CVE-2016-4574", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4574", }, ], notes: [ { category: "general", text: "Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4574", url: "https://www.suse.com/security/cve/CVE-2016-4574", }, { category: "external", summary: "SUSE Bug 1135436 for CVE-2016-4574", url: "https://bugzilla.suse.com/1135436", }, { category: "external", summary: "SUSE Bug 979261 for CVE-2016-4574", url: "https://bugzilla.suse.com/979261", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-4574", }, { cve: "CVE-2016-4579", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4579", }, ], notes: [ { category: "general", text: "Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the \"returned length of the object from _ksba_ber_parse_tl.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4579", url: "https://www.suse.com/security/cve/CVE-2016-4579", }, { category: "external", summary: "SUSE Bug 1135436 for CVE-2016-4579", url: "https://bugzilla.suse.com/1135436", }, { category: "external", summary: "SUSE Bug 979906 for CVE-2016-4579", url: "https://bugzilla.suse.com/979906", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-4579", }, { cve: "CVE-2016-4658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4658", }, ], notes: [ { category: "general", text: "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4658", url: "https://www.suse.com/security/cve/CVE-2016-4658", }, { category: "external", summary: "SUSE Bug 1005544 for CVE-2016-4658", url: "https://bugzilla.suse.com/1005544", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2016-4658", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1069433 for CVE-2016-4658", url: "https://bugzilla.suse.com/1069433", }, { category: "external", summary: "SUSE Bug 1078813 for CVE-2016-4658", url: "https://bugzilla.suse.com/1078813", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4658", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-4658", }, { cve: "CVE-2016-5011", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5011", }, ], notes: [ { category: "general", text: "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5011", url: "https://www.suse.com/security/cve/CVE-2016-5011", }, { category: "external", summary: "SUSE Bug 988361 for CVE-2016-5011", url: "https://bugzilla.suse.com/988361", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-5011", }, { cve: "CVE-2016-5300", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5300", }, ], notes: [ { category: "general", text: "The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5300", url: "https://www.suse.com/security/cve/CVE-2016-5300", }, { category: "external", summary: "SUSE Bug 983216 for CVE-2016-5300", url: "https://bugzilla.suse.com/983216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-5300", }, { cve: "CVE-2016-5419", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5419", }, ], notes: [ { category: "general", text: "curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5419", url: "https://www.suse.com/security/cve/CVE-2016-5419", }, { category: "external", summary: "SUSE Bug 1033413 for CVE-2016-5419", url: "https://bugzilla.suse.com/1033413", }, { category: "external", summary: "SUSE Bug 1033442 for CVE-2016-5419", url: "https://bugzilla.suse.com/1033442", }, { category: "external", summary: "SUSE Bug 991389 for CVE-2016-5419", url: "https://bugzilla.suse.com/991389", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-5419", }, { cve: "CVE-2016-5420", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5420", }, ], notes: [ { category: "general", text: "curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5420", url: "https://www.suse.com/security/cve/CVE-2016-5420", }, { category: "external", summary: "SUSE Bug 991390 for CVE-2016-5420", url: "https://bugzilla.suse.com/991390", }, { category: "external", summary: "SUSE Bug 997420 for CVE-2016-5420", url: "https://bugzilla.suse.com/997420", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-5420", }, { cve: "CVE-2016-5421", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5421", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5421", url: "https://www.suse.com/security/cve/CVE-2016-5421", }, { category: "external", summary: "SUSE Bug 991391 for CVE-2016-5421", url: "https://bugzilla.suse.com/991391", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-5421", }, { cve: "CVE-2016-6185", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6185", }, ], notes: [ { category: "general", text: "The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6185", url: "https://www.suse.com/security/cve/CVE-2016-6185", }, { category: "external", summary: "SUSE Bug 988311 for CVE-2016-6185", url: "https://bugzilla.suse.com/988311", }, { category: "external", summary: "SUSE Bug 999993 for CVE-2016-6185", url: "https://bugzilla.suse.com/999993", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-6185", }, { cve: "CVE-2016-6261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6261", }, ], notes: [ { category: "general", text: "The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6261", url: "https://www.suse.com/security/cve/CVE-2016-6261", }, { category: "external", summary: "SUSE Bug 1118435 for CVE-2016-6261", url: "https://bugzilla.suse.com/1118435", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2016-6261", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 990190 for CVE-2016-6261", url: "https://bugzilla.suse.com/990190", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-6261", }, { cve: "CVE-2016-6262", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6262", }, ], notes: [ { category: "general", text: "idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6262", url: "https://www.suse.com/security/cve/CVE-2016-6262", }, { category: "external", summary: "SUSE Bug 1014473 for CVE-2016-6262", url: "https://bugzilla.suse.com/1014473", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2016-6262", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 1190777 for CVE-2016-6262", url: "https://bugzilla.suse.com/1190777", }, { category: "external", summary: "SUSE Bug 990189 for CVE-2016-6262", url: "https://bugzilla.suse.com/990189", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-6262", }, { cve: "CVE-2016-6263", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6263", }, ], notes: [ { category: "general", text: "The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6263", url: "https://www.suse.com/security/cve/CVE-2016-6263", }, { category: "external", summary: "SUSE Bug 1118435 for CVE-2016-6263", url: "https://bugzilla.suse.com/1118435", }, { category: "external", summary: "SUSE Bug 990191 for CVE-2016-6263", url: "https://bugzilla.suse.com/990191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-6263", }, { cve: "CVE-2016-6302", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6302", }, ], notes: [ { category: "general", text: "The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6302", url: "https://www.suse.com/security/cve/CVE-2016-6302", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6302", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-6302", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995324 for CVE-2016-6302", url: "https://bugzilla.suse.com/995324", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6302", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-6302", }, { cve: "CVE-2016-6303", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6303", }, ], notes: [ { category: "general", text: "Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6303", url: "https://www.suse.com/security/cve/CVE-2016-6303", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6303", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-6303", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-6303", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995377 for CVE-2016-6303", url: "https://bugzilla.suse.com/995377", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6303", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-6303", }, { cve: "CVE-2016-6304", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6304", }, ], notes: [ { category: "general", text: "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6304", url: "https://www.suse.com/security/cve/CVE-2016-6304", }, { category: "external", summary: "SUSE Bug 1001706 for CVE-2016-6304", url: "https://bugzilla.suse.com/1001706", }, { category: "external", summary: "SUSE Bug 1003811 for CVE-2016-6304", url: "https://bugzilla.suse.com/1003811", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6304", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 1005579 for CVE-2016-6304", url: "https://bugzilla.suse.com/1005579", }, { category: "external", summary: "SUSE Bug 1021375 for CVE-2016-6304", url: "https://bugzilla.suse.com/1021375", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6304", url: "https://bugzilla.suse.com/999665", }, { category: "external", summary: "SUSE Bug 999666 for CVE-2016-6304", url: "https://bugzilla.suse.com/999666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-6304", }, { cve: "CVE-2016-6306", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6306", }, ], notes: [ { category: "general", text: "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6306", url: "https://www.suse.com/security/cve/CVE-2016-6306", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6306", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6306", url: "https://bugzilla.suse.com/999665", }, { category: "external", summary: "SUSE Bug 999668 for CVE-2016-6306", url: "https://bugzilla.suse.com/999668", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-6306", }, { cve: "CVE-2016-6313", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6313", }, ], notes: [ { category: "general", text: "The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6313", url: "https://www.suse.com/security/cve/CVE-2016-6313", }, { category: "external", summary: "SUSE Bug 1123792 for CVE-2016-6313", url: "https://bugzilla.suse.com/1123792", }, { category: "external", summary: "SUSE Bug 994157 for CVE-2016-6313", url: "https://bugzilla.suse.com/994157", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-6313", }, { cve: "CVE-2016-6318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6318", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6318", url: "https://www.suse.com/security/cve/CVE-2016-6318", }, { category: "external", summary: "SUSE Bug 1123113 for CVE-2016-6318", url: "https://bugzilla.suse.com/1123113", }, { category: "external", summary: "SUSE Bug 992966 for CVE-2016-6318", url: "https://bugzilla.suse.com/992966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-6318", }, { cve: "CVE-2016-7056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7056", }, ], notes: [ { category: "general", text: "A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7056", url: "https://www.suse.com/security/cve/CVE-2016-7056", }, { category: "external", summary: "SUSE Bug 1005878 for CVE-2016-7056", url: "https://bugzilla.suse.com/1005878", }, { category: "external", summary: "SUSE Bug 1019334 for CVE-2016-7056", url: "https://bugzilla.suse.com/1019334", }, { category: "external", summary: "SUSE Bug 1148697 for CVE-2016-7056", url: "https://bugzilla.suse.com/1148697", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-7056", }, { cve: "CVE-2016-7141", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7141", }, ], notes: [ { category: "general", text: "curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7141", url: "https://www.suse.com/security/cve/CVE-2016-7141", }, { category: "external", summary: "SUSE Bug 991390 for CVE-2016-7141", url: "https://bugzilla.suse.com/991390", }, { category: "external", summary: "SUSE Bug 997420 for CVE-2016-7141", url: "https://bugzilla.suse.com/997420", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-7141", }, { cve: "CVE-2016-7167", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7167", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7167", url: "https://www.suse.com/security/cve/CVE-2016-7167", }, { category: "external", summary: "SUSE Bug 998760 for CVE-2016-7167", url: "https://bugzilla.suse.com/998760", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-7167", }, { cve: "CVE-2016-7543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7543", }, ], notes: [ { category: "general", text: "Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7543", url: "https://www.suse.com/security/cve/CVE-2016-7543", }, { category: "external", summary: "SUSE Bug 1001299 for CVE-2016-7543", url: "https://bugzilla.suse.com/1001299", }, { category: "external", summary: "SUSE Bug 1159416 for CVE-2016-7543", url: "https://bugzilla.suse.com/1159416", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-7543", }, { cve: "CVE-2016-7796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7796", }, ], notes: [ { category: "general", text: "The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7796", url: "https://www.suse.com/security/cve/CVE-2016-7796", }, { category: "external", summary: "SUSE Bug 1001765 for CVE-2016-7796", url: "https://bugzilla.suse.com/1001765", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-7796", }, { cve: "CVE-2016-8610", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8610", }, ], notes: [ { category: "general", text: "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8610", url: "https://www.suse.com/security/cve/CVE-2016-8610", }, { category: "external", summary: "SUSE Bug 1005878 for CVE-2016-8610", url: "https://bugzilla.suse.com/1005878", }, { category: "external", summary: "SUSE Bug 1005879 for CVE-2016-8610", url: "https://bugzilla.suse.com/1005879", }, { category: "external", summary: "SUSE Bug 1110018 for CVE-2016-8610", url: "https://bugzilla.suse.com/1110018", }, { category: "external", summary: "SUSE Bug 1120592 for CVE-2016-8610", url: "https://bugzilla.suse.com/1120592", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2016-8610", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1148697 for CVE-2016-8610", url: "https://bugzilla.suse.com/1148697", }, { category: "external", summary: "SUSE Bug 982575 for CVE-2016-8610", url: "https://bugzilla.suse.com/982575", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-8610", }, { cve: "CVE-2016-8615", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8615", }, ], notes: [ { category: "general", text: "A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8615", url: "https://www.suse.com/security/cve/CVE-2016-8615", }, { category: "external", summary: "SUSE Bug 1005633 for CVE-2016-8615", url: "https://bugzilla.suse.com/1005633", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-8615", }, { cve: "CVE-2016-8616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8616", }, ], notes: [ { category: "general", text: "A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8616", url: "https://www.suse.com/security/cve/CVE-2016-8616", }, { category: "external", summary: "SUSE Bug 1005634 for CVE-2016-8616", url: "https://bugzilla.suse.com/1005634", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-8616", }, { cve: "CVE-2016-8617", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8617", }, ], notes: [ { category: "general", text: "The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8617", url: "https://www.suse.com/security/cve/CVE-2016-8617", }, { category: "external", summary: "SUSE Bug 1005635 for CVE-2016-8617", url: "https://bugzilla.suse.com/1005635", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-8617", }, { cve: "CVE-2016-8618", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8618", }, ], notes: [ { category: "general", text: "The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8618", url: "https://www.suse.com/security/cve/CVE-2016-8618", }, { category: "external", summary: "SUSE Bug 1005637 for CVE-2016-8618", url: "https://bugzilla.suse.com/1005637", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-8618", }, { cve: "CVE-2016-8619", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8619", }, ], notes: [ { category: "general", text: "The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8619", url: "https://www.suse.com/security/cve/CVE-2016-8619", }, { category: "external", summary: "SUSE Bug 1005638 for CVE-2016-8619", url: "https://bugzilla.suse.com/1005638", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-8619", }, { cve: "CVE-2016-8620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8620", }, ], notes: [ { category: "general", text: "The 'globbing' feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8620", url: "https://www.suse.com/security/cve/CVE-2016-8620", }, { category: "external", summary: "SUSE Bug 1005640 for CVE-2016-8620", url: "https://bugzilla.suse.com/1005640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-8620", }, { cve: "CVE-2016-8621", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8621", }, ], notes: [ { category: "general", text: "The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8621", url: "https://www.suse.com/security/cve/CVE-2016-8621", }, { category: "external", summary: "SUSE Bug 1005642 for CVE-2016-8621", url: "https://bugzilla.suse.com/1005642", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-8621", }, { cve: "CVE-2016-8622", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8622", }, ], notes: [ { category: "general", text: "The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8622", url: "https://www.suse.com/security/cve/CVE-2016-8622", }, { category: "external", summary: "SUSE Bug 1005643 for CVE-2016-8622", url: "https://bugzilla.suse.com/1005643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-8622", }, { cve: "CVE-2016-8623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8623", }, ], notes: [ { category: "general", text: "A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8623", url: "https://www.suse.com/security/cve/CVE-2016-8623", }, { category: "external", summary: "SUSE Bug 1005645 for CVE-2016-8623", url: "https://bugzilla.suse.com/1005645", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-8623", }, { cve: "CVE-2016-8624", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8624", }, ], notes: [ { category: "general", text: "curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8624", url: "https://www.suse.com/security/cve/CVE-2016-8624", }, { category: "external", summary: "SUSE Bug 1005646 for CVE-2016-8624", url: "https://bugzilla.suse.com/1005646", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-8624", }, { cve: "CVE-2016-9063", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9063", }, ], notes: [ { category: "general", text: "An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9063", url: "https://www.suse.com/security/cve/CVE-2016-9063", }, { category: "external", summary: "SUSE Bug 1009026 for CVE-2016-9063", url: "https://bugzilla.suse.com/1009026", }, { category: "external", summary: "SUSE Bug 1010424 for CVE-2016-9063", url: "https://bugzilla.suse.com/1010424", }, { category: "external", summary: "SUSE Bug 1047240 for CVE-2016-9063", url: "https://bugzilla.suse.com/1047240", }, { category: "external", summary: "SUSE Bug 1123115 for CVE-2016-9063", url: "https://bugzilla.suse.com/1123115", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2016-9063", }, { cve: "CVE-2016-9318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9318", }, ], notes: [ { category: "general", text: "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9318", url: "https://www.suse.com/security/cve/CVE-2016-9318", }, { category: "external", summary: "SUSE Bug 1010675 for CVE-2016-9318", url: "https://bugzilla.suse.com/1010675", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2016-9318", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1019074 for CVE-2016-9318", url: "https://bugzilla.suse.com/1019074", }, { category: "external", summary: "SUSE Bug 1118959 for CVE-2016-9318", url: "https://bugzilla.suse.com/1118959", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-9318", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 1126613 for CVE-2016-9318", url: "https://bugzilla.suse.com/1126613", }, { category: "external", summary: "SUSE Bug 1148896 for CVE-2016-9318", url: "https://bugzilla.suse.com/1148896", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-9318", }, { cve: "CVE-2016-9586", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9586", }, ], notes: [ { category: "general", text: "curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9586", url: "https://www.suse.com/security/cve/CVE-2016-9586", }, { category: "external", summary: "SUSE Bug 1015332 for CVE-2016-9586", url: "https://bugzilla.suse.com/1015332", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-9586", }, { cve: "CVE-2016-9597", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9597", }, ], notes: [ { category: "general", text: "It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression CVE for the same issue as CVE-2016-3705.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9597", url: "https://www.suse.com/security/cve/CVE-2016-9597", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2016-9597", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1017497 for CVE-2016-9597", url: "https://bugzilla.suse.com/1017497", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-9597", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-9597", }, { cve: "CVE-2016-9840", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9840", }, ], notes: [ { category: "general", text: "inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9840", url: "https://www.suse.com/security/cve/CVE-2016-9840", }, { category: "external", summary: "SUSE Bug 1003579 for CVE-2016-9840", url: "https://bugzilla.suse.com/1003579", }, { category: "external", summary: "SUSE Bug 1022633 for CVE-2016-9840", url: "https://bugzilla.suse.com/1022633", }, { category: "external", summary: "SUSE Bug 1023215 for CVE-2016-9840", url: "https://bugzilla.suse.com/1023215", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9840", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1062104 for CVE-2016-9840", url: "https://bugzilla.suse.com/1062104", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9840", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9840", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9840", url: "https://bugzilla.suse.com/1127473", }, { category: "external", summary: "SUSE Bug 1184301 for CVE-2016-9840", url: "https://bugzilla.suse.com/1184301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-9840", }, { cve: "CVE-2016-9841", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9841", }, ], notes: [ { category: "general", text: "inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9841", url: "https://www.suse.com/security/cve/CVE-2016-9841", }, { category: "external", summary: "SUSE Bug 1003579 for CVE-2016-9841", url: "https://bugzilla.suse.com/1003579", }, { category: "external", summary: "SUSE Bug 1022633 for CVE-2016-9841", url: "https://bugzilla.suse.com/1022633", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9841", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1064070 for CVE-2016-9841", url: "https://bugzilla.suse.com/1064070", }, { category: "external", summary: "SUSE Bug 1070162 for CVE-2016-9841", url: "https://bugzilla.suse.com/1070162", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9841", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9841", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9841", url: "https://bugzilla.suse.com/1127473", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-9841", }, { cve: "CVE-2016-9842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9842", }, ], notes: [ { category: "general", text: "The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9842", url: "https://www.suse.com/security/cve/CVE-2016-9842", }, { category: "external", summary: "SUSE Bug 1003580 for CVE-2016-9842", url: "https://bugzilla.suse.com/1003580", }, { category: "external", summary: "SUSE Bug 1022633 for CVE-2016-9842", url: "https://bugzilla.suse.com/1022633", }, { category: "external", summary: "SUSE Bug 1023215 for CVE-2016-9842", url: "https://bugzilla.suse.com/1023215", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9842", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1062104 for CVE-2016-9842", url: "https://bugzilla.suse.com/1062104", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9842", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9842", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9842", url: "https://bugzilla.suse.com/1127473", }, { category: "external", summary: "SUSE Bug 1184301 for CVE-2016-9842", url: "https://bugzilla.suse.com/1184301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-9842", }, { cve: "CVE-2016-9843", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9843", }, ], notes: [ { category: "general", text: "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9843", url: "https://www.suse.com/security/cve/CVE-2016-9843", }, { category: "external", summary: "SUSE Bug 1003580 for CVE-2016-9843", url: "https://bugzilla.suse.com/1003580", }, { category: "external", summary: "SUSE Bug 1013882 for CVE-2016-9843", url: "https://bugzilla.suse.com/1013882", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9843", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1062104 for CVE-2016-9843", url: "https://bugzilla.suse.com/1062104", }, { category: "external", summary: "SUSE Bug 1116686 for CVE-2016-9843", url: "https://bugzilla.suse.com/1116686", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9843", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9843", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9843", url: "https://bugzilla.suse.com/1127473", }, { category: "external", summary: "SUSE Bug 1184301 for CVE-2016-9843", url: "https://bugzilla.suse.com/1184301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-9843", }, { cve: "CVE-2017-1000100", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000100", }, ], notes: [ { category: "general", text: "When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000100", url: "https://www.suse.com/security/cve/CVE-2017-1000100", }, { category: "external", summary: "SUSE Bug 1051644 for CVE-2017-1000100", url: "https://bugzilla.suse.com/1051644", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2017-1000100", }, { cve: "CVE-2017-1000101", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000101", }, ], notes: [ { category: "general", text: "curl supports \"globbing\" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000101", url: "https://www.suse.com/security/cve/CVE-2017-1000101", }, { category: "external", summary: "SUSE Bug 1051643 for CVE-2017-1000101", url: "https://bugzilla.suse.com/1051643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-1000101", }, { cve: "CVE-2017-1000366", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000366", }, ], notes: [ { category: "general", text: "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000366", url: "https://www.suse.com/security/cve/CVE-2017-1000366", }, { category: "external", summary: "SUSE Bug 1037551 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1037551", }, { category: "external", summary: "SUSE Bug 1039357 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1039357", }, { category: "external", summary: "SUSE Bug 1063847 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1063847", }, { category: "external", summary: "SUSE Bug 1071319 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1071319", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1123874", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-1000366", }, { cve: "CVE-2017-10684", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10684", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10684", url: "https://www.suse.com/security/cve/CVE-2017-10684", }, { category: "external", summary: "SUSE Bug 1046858 for CVE-2017-10684", url: "https://bugzilla.suse.com/1046858", }, { category: "external", summary: "SUSE Bug 1115932 for CVE-2017-10684", url: "https://bugzilla.suse.com/1115932", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-10684", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-10684", }, { cve: "CVE-2017-10685", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10685", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10685", url: "https://www.suse.com/security/cve/CVE-2017-10685", }, { category: "external", summary: "SUSE Bug 1046853 for CVE-2017-10685", url: "https://bugzilla.suse.com/1046853", }, { category: "external", summary: "SUSE Bug 1115932 for CVE-2017-10685", url: "https://bugzilla.suse.com/1115932", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-10685", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-10685", }, { cve: "CVE-2017-11112", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-11112", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-11112", url: "https://www.suse.com/security/cve/CVE-2017-11112", }, { category: "external", summary: "SUSE Bug 1046853 for CVE-2017-11112", url: "https://bugzilla.suse.com/1046853", }, { category: "external", summary: "SUSE Bug 1047964 for CVE-2017-11112", url: "https://bugzilla.suse.com/1047964", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-11112", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-11112", }, { cve: "CVE-2017-11113", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-11113", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-11113", url: "https://www.suse.com/security/cve/CVE-2017-11113", }, { category: "external", summary: "SUSE Bug 1046853 for CVE-2017-11113", url: "https://bugzilla.suse.com/1046853", }, { category: "external", summary: "SUSE Bug 1047965 for CVE-2017-11113", url: "https://bugzilla.suse.com/1047965", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-11113", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-11113", }, { cve: "CVE-2017-2616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2616", }, ], notes: [ { category: "general", text: "A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-2616", url: "https://www.suse.com/security/cve/CVE-2017-2616", }, { category: "external", summary: "SUSE Bug 1023041 for CVE-2017-2616", url: "https://bugzilla.suse.com/1023041", }, { category: "external", summary: "SUSE Bug 1123789 for CVE-2017-2616", url: "https://bugzilla.suse.com/1123789", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2017-2616", }, { cve: "CVE-2017-3731", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3731", }, ], notes: [ { category: "general", text: "If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3731", url: "https://www.suse.com/security/cve/CVE-2017-3731", }, { category: "external", summary: "SUSE Bug 1021641 for CVE-2017-3731", url: "https://bugzilla.suse.com/1021641", }, { category: "external", summary: "SUSE Bug 1022085 for CVE-2017-3731", url: "https://bugzilla.suse.com/1022085", }, { category: "external", summary: "SUSE Bug 1064118 for CVE-2017-3731", url: "https://bugzilla.suse.com/1064118", }, { category: "external", summary: "SUSE Bug 1064119 for CVE-2017-3731", url: "https://bugzilla.suse.com/1064119", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-3731", }, { cve: "CVE-2017-6507", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6507", }, ], notes: [ { category: "general", text: "An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6507", url: "https://www.suse.com/security/cve/CVE-2017-6507", }, { category: "external", summary: "SUSE Bug 1029696 for CVE-2017-6507", url: "https://bugzilla.suse.com/1029696", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-6507", }, { cve: "CVE-2017-7407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7407", }, ], notes: [ { category: "general", text: "The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7407", url: "https://www.suse.com/security/cve/CVE-2017-7407", }, { category: "external", summary: "SUSE Bug 1032309 for CVE-2017-7407", url: "https://bugzilla.suse.com/1032309", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2017-7407", }, { cve: "CVE-2017-7526", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7526", }, ], notes: [ { category: "general", text: "libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7526", url: "https://www.suse.com/security/cve/CVE-2017-7526", }, { category: "external", summary: "SUSE Bug 1046607 for CVE-2017-7526", url: "https://bugzilla.suse.com/1046607", }, { category: "external", summary: "SUSE Bug 1047462 for CVE-2017-7526", url: "https://bugzilla.suse.com/1047462", }, { category: "external", summary: "SUSE Bug 1123792 for CVE-2017-7526", url: "https://bugzilla.suse.com/1123792", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.9, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2017-7526", }, { cve: "CVE-2017-9047", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9047", }, ], notes: [ { category: "general", text: "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9047", url: "https://www.suse.com/security/cve/CVE-2017-9047", }, { category: "external", summary: "SUSE Bug 1039063 for CVE-2017-9047", url: "https://bugzilla.suse.com/1039063", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9047", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039657 for CVE-2017-9047", url: "https://bugzilla.suse.com/1039657", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2017-9047", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-9047", }, { cve: "CVE-2017-9048", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9048", }, ], notes: [ { category: "general", text: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9048", url: "https://www.suse.com/security/cve/CVE-2017-9048", }, { category: "external", summary: "SUSE Bug 1039064 for CVE-2017-9048", url: "https://bugzilla.suse.com/1039064", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9048", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039658 for CVE-2017-9048", url: "https://bugzilla.suse.com/1039658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-9048", }, { cve: "CVE-2017-9049", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9049", }, ], notes: [ { category: "general", text: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9049", url: "https://www.suse.com/security/cve/CVE-2017-9049", }, { category: "external", summary: "SUSE Bug 1039063 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039063", }, { category: "external", summary: "SUSE Bug 1039064 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039064", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039659 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039659", }, { category: "external", summary: "SUSE Bug 1039661 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039661", }, { category: "external", summary: "SUSE Bug 1069690 for CVE-2017-9049", url: "https://bugzilla.suse.com/1069690", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2017-9049", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2017-9049", }, { cve: "CVE-2017-9050", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9050", }, ], notes: [ { category: "general", text: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9050", url: "https://www.suse.com/security/cve/CVE-2017-9050", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9050", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039069 for CVE-2017-9050", url: "https://bugzilla.suse.com/1039069", }, { category: "external", summary: "SUSE Bug 1039661 for CVE-2017-9050", url: "https://bugzilla.suse.com/1039661", }, { category: "external", summary: "SUSE Bug 1069433 for CVE-2017-9050", url: "https://bugzilla.suse.com/1069433", }, { category: "external", summary: "SUSE Bug 1069690 for CVE-2017-9050", url: "https://bugzilla.suse.com/1069690", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2017-9050", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2017-9050", }, { cve: "CVE-2017-9233", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9233", }, ], notes: [ { category: "general", text: "XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9233", url: "https://www.suse.com/security/cve/CVE-2017-9233", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9233", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1047236 for CVE-2017-9233", url: "https://bugzilla.suse.com/1047236", }, { category: "external", summary: "SUSE Bug 1073350 for CVE-2017-9233", url: "https://bugzilla.suse.com/1073350", }, { category: "external", summary: "SUSE Bug 1123115 for CVE-2017-9233", url: "https://bugzilla.suse.com/1123115", }, { category: "external", summary: "SUSE Bug 983216 for CVE-2017-9233", url: "https://bugzilla.suse.com/983216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2017-9233", }, ], }
suse-su-2016:2872-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for bash", title: "Title of the patch", }, { category: "description", text: "\nThis update for bash fixes the following issues:\n\n- CVE-2016-7543: Local attackers could have executed arbitrary commands via specially crafted SHELLOPTS+PS4 variables (bsc#1001299)\n- CVE-2016-0634: Malicious hostnames could have allowed arbitrary command execution when $HOSTNAME was expanded in the prompt (bsc#1000396)\n- CVE-2014-6277: More troubles with functions (bsc#898812, bsc#1001759)\n- CVE-2014-6278: Code execution after original 6271 fix (bsc#898884)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-DESKTOP-12-SP1-2016-1681,SUSE-SLE-SDK-12-SP1-2016-1681,SUSE-SLE-SERVER-12-SP1-2016-1681,SUSE-SLE-WE-12-SP1-2016-1681", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2872-1.json", }, { category: "self", summary: "URL for SUSE-SU-2016:2872-1", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20162872-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2016:2872-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2016-November/002410.html", }, { category: "self", summary: "SUSE Bug 1000396", url: "https://bugzilla.suse.com/1000396", }, { category: "self", summary: "SUSE Bug 1001299", url: "https://bugzilla.suse.com/1001299", }, { category: "self", summary: "SUSE Bug 1001759", url: "https://bugzilla.suse.com/1001759", }, { category: "self", summary: "SUSE Bug 898812", url: "https://bugzilla.suse.com/898812", }, { category: "self", summary: "SUSE Bug 898884", url: "https://bugzilla.suse.com/898884", }, { category: "self", summary: "SUSE CVE CVE-2014-6277 page", url: "https://www.suse.com/security/cve/CVE-2014-6277/", }, { category: "self", summary: "SUSE CVE CVE-2014-6278 page", url: "https://www.suse.com/security/cve/CVE-2014-6278/", }, { category: "self", summary: "SUSE CVE CVE-2016-0634 page", url: "https://www.suse.com/security/cve/CVE-2016-0634/", }, { category: "self", summary: "SUSE CVE CVE-2016-7543 page", url: "https://www.suse.com/security/cve/CVE-2016-7543/", }, ], title: "Security update for bash", tracking: { current_release_date: "2016-11-22T11:12:17Z", generator: { date: "2016-11-22T11:12:17Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2016:2872-1", initial_release_date: "2016-11-22T11:12:17Z", revision_history: [ { date: "2016-11-22T11:12:17Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "bash-doc-4.2-82.1.noarch", product: { name: "bash-doc-4.2-82.1.noarch", product_id: "bash-doc-4.2-82.1.noarch", }, }, { category: "product_version", name: "bash-lang-4.2-82.1.noarch", product: { name: "bash-lang-4.2-82.1.noarch", product_id: "bash-lang-4.2-82.1.noarch", }, }, { category: "product_version", name: "readline-doc-6.2-82.1.noarch", product: { name: "readline-doc-6.2-82.1.noarch", product_id: "readline-doc-6.2-82.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "bash-devel-4.2-82.1.ppc64le", product: { name: "bash-devel-4.2-82.1.ppc64le", product_id: "bash-devel-4.2-82.1.ppc64le", }, }, { category: "product_version", name: "readline-devel-6.2-82.1.ppc64le", product: { name: "readline-devel-6.2-82.1.ppc64le", product_id: "readline-devel-6.2-82.1.ppc64le", }, }, { category: "product_version", name: "bash-4.2-82.1.ppc64le", product: { name: "bash-4.2-82.1.ppc64le", product_id: "bash-4.2-82.1.ppc64le", }, }, { category: "product_version", name: "libreadline6-6.2-82.1.ppc64le", product: { name: "libreadline6-6.2-82.1.ppc64le", product_id: "libreadline6-6.2-82.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "bash-devel-4.2-82.1.s390x", product: { name: "bash-devel-4.2-82.1.s390x", product_id: "bash-devel-4.2-82.1.s390x", }, }, { category: "product_version", name: "readline-devel-6.2-82.1.s390x", product: { name: "readline-devel-6.2-82.1.s390x", product_id: "readline-devel-6.2-82.1.s390x", }, }, { category: "product_version", name: "bash-4.2-82.1.s390x", product: { name: "bash-4.2-82.1.s390x", product_id: "bash-4.2-82.1.s390x", }, }, { category: "product_version", name: "libreadline6-6.2-82.1.s390x", product: { name: "libreadline6-6.2-82.1.s390x", product_id: "libreadline6-6.2-82.1.s390x", }, }, { category: "product_version", name: "libreadline6-32bit-6.2-82.1.s390x", product: { name: "libreadline6-32bit-6.2-82.1.s390x", product_id: "libreadline6-32bit-6.2-82.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "bash-4.2-82.1.x86_64", product: { name: "bash-4.2-82.1.x86_64", product_id: "bash-4.2-82.1.x86_64", }, }, { category: "product_version", name: "libreadline6-6.2-82.1.x86_64", product: { name: "libreadline6-6.2-82.1.x86_64", product_id: "libreadline6-6.2-82.1.x86_64", }, }, { category: "product_version", name: "libreadline6-32bit-6.2-82.1.x86_64", product: { name: "libreadline6-32bit-6.2-82.1.x86_64", product_id: "libreadline6-32bit-6.2-82.1.x86_64", }, }, { category: "product_version", name: "bash-devel-4.2-82.1.x86_64", product: { name: "bash-devel-4.2-82.1.x86_64", product_id: "bash-devel-4.2-82.1.x86_64", }, }, { category: "product_version", name: "readline-devel-6.2-82.1.x86_64", product: { name: "readline-devel-6.2-82.1.x86_64", product_id: "readline-devel-6.2-82.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP1", product: { name: "SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP1", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP1", product: { name: "SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 12 SP1", product: { name: "SUSE Linux Enterprise Workstation Extension 12 SP1", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:12:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bash-4.2-82.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:bash-4.2-82.1.x86_64", }, product_reference: "bash-4.2-82.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "bash-doc-4.2-82.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:bash-doc-4.2-82.1.noarch", }, product_reference: "bash-doc-4.2-82.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "bash-lang-4.2-82.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:bash-lang-4.2-82.1.noarch", }, product_reference: "bash-lang-4.2-82.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libreadline6-6.2-82.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-6.2-82.1.x86_64", }, product_reference: "libreadline6-6.2-82.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libreadline6-32bit-6.2-82.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", }, product_reference: "libreadline6-32bit-6.2-82.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "readline-doc-6.2-82.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", product_id: "SUSE Linux Enterprise Desktop 12 SP1:readline-doc-6.2-82.1.noarch", }, product_reference: "readline-doc-6.2-82.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP1", }, { category: "default_component_of", full_product_name: { name: "bash-devel-4.2-82.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.ppc64le", }, product_reference: "bash-devel-4.2-82.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "bash-devel-4.2-82.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.s390x", }, product_reference: "bash-devel-4.2-82.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "bash-devel-4.2-82.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.x86_64", }, product_reference: "bash-devel-4.2-82.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "readline-devel-6.2-82.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.ppc64le", }, product_reference: "readline-devel-6.2-82.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "readline-devel-6.2-82.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.s390x", }, product_reference: "readline-devel-6.2-82.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "readline-devel-6.2-82.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.x86_64", }, product_reference: "readline-devel-6.2-82.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP1", }, { category: "default_component_of", full_product_name: { name: "bash-4.2-82.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.ppc64le", }, product_reference: "bash-4.2-82.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "bash-4.2-82.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.s390x", }, product_reference: "bash-4.2-82.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "bash-4.2-82.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.x86_64", }, product_reference: "bash-4.2-82.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "bash-doc-4.2-82.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:bash-doc-4.2-82.1.noarch", }, product_reference: "bash-doc-4.2-82.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libreadline6-6.2-82.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.ppc64le", }, product_reference: "libreadline6-6.2-82.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libreadline6-6.2-82.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.s390x", }, product_reference: "libreadline6-6.2-82.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libreadline6-6.2-82.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.x86_64", }, product_reference: "libreadline6-6.2-82.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libreadline6-32bit-6.2-82.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.s390x", }, product_reference: "libreadline6-32bit-6.2-82.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libreadline6-32bit-6.2-82.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", }, product_reference: "libreadline6-32bit-6.2-82.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "readline-doc-6.2-82.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", product_id: "SUSE Linux Enterprise Server 12 SP1:readline-doc-6.2-82.1.noarch", }, product_reference: "readline-doc-6.2-82.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1", }, { category: "default_component_of", full_product_name: { name: "bash-4.2-82.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.ppc64le", }, product_reference: "bash-4.2-82.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "bash-4.2-82.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.s390x", }, product_reference: "bash-4.2-82.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "bash-4.2-82.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.x86_64", }, product_reference: "bash-4.2-82.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "bash-doc-4.2-82.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-doc-4.2-82.1.noarch", }, product_reference: "bash-doc-4.2-82.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libreadline6-6.2-82.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.ppc64le", }, product_reference: "libreadline6-6.2-82.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libreadline6-6.2-82.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.s390x", }, product_reference: "libreadline6-6.2-82.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libreadline6-6.2-82.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.x86_64", }, product_reference: "libreadline6-6.2-82.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libreadline6-32bit-6.2-82.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.s390x", }, product_reference: "libreadline6-32bit-6.2-82.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "libreadline6-32bit-6.2-82.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", }, product_reference: "libreadline6-32bit-6.2-82.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "readline-doc-6.2-82.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:readline-doc-6.2-82.1.noarch", }, product_reference: "readline-doc-6.2-82.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "bash-lang-4.2-82.1.noarch as component of SUSE Linux Enterprise Workstation Extension 12 SP1", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP1:bash-lang-4.2-82.1.noarch", }, product_reference: "bash-lang-4.2-82.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2014-6277", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6277", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:bash-lang-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:bash-lang-4.2-82.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2014-6277", url: "https://www.suse.com/security/cve/CVE-2014-6277", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6277", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6277", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6277", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-6277", url: "https://bugzilla.suse.com/900454", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:bash-lang-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:bash-lang-4.2-82.1.noarch", ], }, ], threats: [ { category: "impact", date: "2016-11-22T11:12:17Z", details: "critical", }, ], title: "CVE-2014-6277", }, { cve: "CVE-2014-6278", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6278", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:bash-lang-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:bash-lang-4.2-82.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2014-6278", url: "https://www.suse.com/security/cve/CVE-2014-6278", }, { category: "external", summary: "SUSE Bug 898604 for CVE-2014-6278", url: "https://bugzilla.suse.com/898604", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6278", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6278", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6278", url: "https://bugzilla.suse.com/900127", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:bash-lang-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:bash-lang-4.2-82.1.noarch", ], }, ], threats: [ { category: "impact", date: "2016-11-22T11:12:17Z", details: "critical", }, ], title: "CVE-2014-6278", }, { cve: "CVE-2016-0634", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0634", }, ], notes: [ { category: "general", text: "The expansion of '\\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:bash-lang-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:bash-lang-4.2-82.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2016-0634", url: "https://www.suse.com/security/cve/CVE-2016-0634", }, { category: "external", summary: "SUSE Bug 1000396 for CVE-2016-0634", url: "https://bugzilla.suse.com/1000396", }, { category: "external", summary: "SUSE Bug 1001299 for CVE-2016-0634", url: "https://bugzilla.suse.com/1001299", }, { category: "external", summary: "SUSE Bug 1159416 for CVE-2016-0634", url: "https://bugzilla.suse.com/1159416", }, { category: "external", summary: "SUSE Bug 1188388 for CVE-2016-0634", url: "https://bugzilla.suse.com/1188388", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:bash-lang-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:bash-lang-4.2-82.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:bash-lang-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:bash-lang-4.2-82.1.noarch", ], }, ], threats: [ { category: "impact", date: "2016-11-22T11:12:17Z", details: "moderate", }, ], title: "CVE-2016-0634", }, { cve: "CVE-2016-7543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7543", }, ], notes: [ { category: "general", text: "Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Desktop 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:bash-lang-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:bash-lang-4.2-82.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2016-7543", url: "https://www.suse.com/security/cve/CVE-2016-7543", }, { category: "external", summary: "SUSE Bug 1001299 for CVE-2016-7543", url: "https://bugzilla.suse.com/1001299", }, { category: "external", summary: "SUSE Bug 1159416 for CVE-2016-7543", url: "https://bugzilla.suse.com/1159416", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Desktop 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:bash-lang-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:bash-lang-4.2-82.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Desktop 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:bash-lang-4.2-82.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-4.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:bash-doc-4.2-82.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-32bit-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:libreadline6-6.2-82.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:readline-doc-6.2-82.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:bash-devel-4.2-82.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:readline-devel-6.2-82.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:bash-lang-4.2-82.1.noarch", ], }, ], threats: [ { category: "impact", date: "2016-11-22T11:12:17Z", details: "moderate", }, ], title: "CVE-2016-7543", }, ], }
fkie_cve-2014-6277
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
gnu | bash | 1.14.0 | |
gnu | bash | 1.14.1 | |
gnu | bash | 1.14.2 | |
gnu | bash | 1.14.3 | |
gnu | bash | 1.14.4 | |
gnu | bash | 1.14.5 | |
gnu | bash | 1.14.6 | |
gnu | bash | 1.14.7 | |
gnu | bash | 2.0 | |
gnu | bash | 2.01 | |
gnu | bash | 2.01.1 | |
gnu | bash | 2.02 | |
gnu | bash | 2.02.1 | |
gnu | bash | 2.03 | |
gnu | bash | 2.04 | |
gnu | bash | 2.05 | |
gnu | bash | 2.05 | |
gnu | bash | 2.05 | |
gnu | bash | 3.0 | |
gnu | bash | 3.0.16 | |
gnu | bash | 3.1 | |
gnu | bash | 3.2 | |
gnu | bash | 3.2.48 | |
gnu | bash | 4.0 | |
gnu | bash | 4.0 | |
gnu | bash | 4.1 | |
gnu | bash | 4.2 | |
gnu | bash | 4.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", matchCriteriaId: "FCAC75DF-FFF7-4721-9D47-6E29A5CCB7C8", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", matchCriteriaId: "FCF4B4BB-C5A0-4283-9657-FC61BC95C014", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", matchCriteriaId: "9B04CBBD-E855-48D7-A5C9-AEC2B38FF1F4", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", matchCriteriaId: "972BDA0A-25C8-4C02-8624-07D2462C214C", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", matchCriteriaId: "5B9EDE56-A8C4-40A8-9D14-F6E86F464BD7", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", matchCriteriaId: "DAB4B8E1-E013-4DB5-AF65-70CC2AEC3B20", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", matchCriteriaId: "B5428D5A-7443-4BDD-9690-E44DBDBCAC9E", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", matchCriteriaId: "18A6E8C3-334D-443B-8AD6-F8A131490F4C", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", matchCriteriaId: "5C74DAE6-8A77-47BF-B3ED-D76CD5AD75BB", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", matchCriteriaId: "8B631B7E-C59D-444F-80CE-DC2345A56E97", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", matchCriteriaId: "91C8E637-AD10-4854-AD60-A908D017DDA8", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", matchCriteriaId: "75AB7456-89E4-4F40-82D0-EED52CAEE670", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", matchCriteriaId: "C7E516F7-B6C6-4A0B-90F4-BC0F382E62E4", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", matchCriteriaId: "2E37A5D0-79EB-442D-B4B8-49F5137A3FA9", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", matchCriteriaId: "AE919509-57B0-4D13-9503-943D5BFED620", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", matchCriteriaId: "0F027515-A126-4899-B78E-121C8312002F", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", matchCriteriaId: "AC05A483-FAFD-4C40-85BC-D2EE907B2B54", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", matchCriteriaId: "097C61C9-4761-4D8F-9590-376FC1A5522B", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", matchCriteriaId: "FCA81069-36E0-4035-B31F-A5281E10C760", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", matchCriteriaId: "BC216C39-2EA0-4B58-87EA-81A737E5D2E4", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", matchCriteriaId: "88731DFF-B0B1-4325-A662-287D5E6E7265", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", matchCriteriaId: "A7BB3ECE-0E83-45EB-AC27-BA29E2C52D1A", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*", matchCriteriaId: "3FA313D8-2B28-4C73-A96B-7814C37F0725", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", matchCriteriaId: "43630818-4A62-4766-AADC-AB87BE1C5553", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", matchCriteriaId: "202B9DB4-80DC-4D1C-8DA8-C06E89FF542A", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", matchCriteriaId: "37CB667F-26C8-46FA-81CE-1F6909AC006D", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", matchCriteriaId: "755984AB-D061-45F0-8845-D7B78BA506E5", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", matchCriteriaId: "BC1DAC9F-711C-47EA-9BBC-0EDB2AF0A1AC", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", }, { lang: "es", value: "GNU Bash hasta 4.3 bash43-026 no analiza debidamente las definiciones de funciones en los valores de las variables de entornos, lo que permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (acceso a memoria no inicializada, y operaciones de leer y escribir de puntero no confiables) a través de un entorno manipulado, como fue demostrado por vectores que involucran la característica ForceCommand en OpenSSH sshd, los módulos mod_cgi y mod_cgid en el servidor de Apache HTTP , secuencias de comandos ejecutados por clientes DHCP no especificados, y otras situaciones en que la configuración del entorno ocurre cruzando un límite de privilegios de la ejecución de Bash. NOTA: esta vulnerabilidad existe debido a una solución incompleta para CVE-2014-6271 y CVE-2014-7169.", }, ], id: "CVE-2014-6277", lastModified: "2024-11-21T02:14:04.890", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-09-27T22:55:02.660", references: [ { source: "security@debian.org", url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { source: "security@debian.org", url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { source: "security@debian.org", tags: [ "Exploit", "Patch", ], url: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", }, { source: "security@debian.org", url: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", }, { source: "security@debian.org", url: "http://linux.oracle.com/errata/ELSA-2014-3093", }, { source: "security@debian.org", url: "http://linux.oracle.com/errata/ELSA-2014-3094", }, { source: "security@debian.org", url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { source: "security@debian.org", url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { source: "security@debian.org", url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { source: "security@debian.org", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { source: "security@debian.org", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { source: "security@debian.org", url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { source: "security@debian.org", url: "http://secunia.com/advisories/58200", }, { source: "security@debian.org", url: "http://secunia.com/advisories/59907", }, { source: "security@debian.org", url: "http://secunia.com/advisories/59961", }, { source: "security@debian.org", url: "http://secunia.com/advisories/60024", }, { source: "security@debian.org", url: "http://secunia.com/advisories/60034", }, { source: "security@debian.org", url: "http://secunia.com/advisories/60044", }, { source: "security@debian.org", url: "http://secunia.com/advisories/60055", }, { source: "security@debian.org", url: "http://secunia.com/advisories/60063", }, { source: "security@debian.org", url: "http://secunia.com/advisories/60193", }, { source: "security@debian.org", url: "http://secunia.com/advisories/60325", }, { source: "security@debian.org", url: "http://secunia.com/advisories/60433", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61065", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61128", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61129", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61283", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61287", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61291", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61312", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61313", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61328", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61442", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61471", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61485", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61503", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61550", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61552", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61565", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61603", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61633", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61641", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61643", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61654", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61703", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61780", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61816", }, { source: "security@debian.org", url: "http://secunia.com/advisories/61857", }, { source: "security@debian.org", url: "http://secunia.com/advisories/62312", }, { source: "security@debian.org", url: "http://secunia.com/advisories/62343", }, { source: "security@debian.org", url: "http://support.apple.com/HT204244", }, { source: "security@debian.org", url: "http://support.novell.com/security/cve/CVE-2014-6277.html", }, { source: "security@debian.org", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { source: "security@debian.org", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { source: "security@debian.org", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { source: "security@debian.org", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { source: "security@debian.org", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, { source: "security@debian.org", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { source: "security@debian.org", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { source: "security@debian.org", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { source: "security@debian.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { source: "security@debian.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { source: "security@debian.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { source: "security@debian.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { source: "security@debian.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { source: "security@debian.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { source: "security@debian.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { source: "security@debian.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { source: "security@debian.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { source: "security@debian.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { source: "security@debian.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { source: "security@debian.org", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { source: "security@debian.org", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { source: "security@debian.org", url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { source: "security@debian.org", url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { source: "security@debian.org", url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { source: "security@debian.org", url: "http://www.ubuntu.com/usn/USN-2380-1", }, { source: "security@debian.org", url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { source: "security@debian.org", url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { source: "security@debian.org", url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { source: "security@debian.org", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { source: "security@debian.org", url: "https://support.apple.com/HT205267", }, { source: "security@debian.org", url: "https://support.citrix.com/article/CTX200217", }, { source: "security@debian.org", url: "https://support.citrix.com/article/CTX200223", }, { source: "security@debian.org", url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { source: "security@debian.org", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { source: "security@debian.org", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { source: "security@debian.org", url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { source: "security@debian.org", url: "https://www.suse.com/support/shellshock/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", ], url: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://linux.oracle.com/errata/ELSA-2014-3093", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://linux.oracle.com/errata/ELSA-2014-3094", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141383353622268&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141383465822787&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/58200", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/59907", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/59961", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60024", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60034", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60044", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60055", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60063", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60193", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60325", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60433", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61065", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61128", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61129", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61283", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61287", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61291", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61312", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61313", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61328", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61442", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61471", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61485", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61503", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61550", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61552", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61565", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61603", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61633", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61641", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61643", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61654", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61703", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61780", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61816", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61857", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/62312", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/62343", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://support.apple.com/HT204244", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://support.novell.com/security/cve/CVE-2014-6277.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/USN-2380-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.apple.com/HT205267", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.citrix.com/article/CTX200217", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.citrix.com/article/CTX200223", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.suse.com/support/shellshock/", }, ], sourceIdentifier: "security@debian.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-78", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
opensuse-su-2024:10106-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "bash-4.4-92.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the bash-4.4-92.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10106", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10106-1.json", }, { category: "self", summary: "SUSE CVE CVE-2014-2524 page", url: "https://www.suse.com/security/cve/CVE-2014-2524/", }, { category: "self", summary: "SUSE CVE CVE-2014-6271 page", url: "https://www.suse.com/security/cve/CVE-2014-6271/", }, { category: "self", summary: "SUSE CVE CVE-2014-6277 page", url: "https://www.suse.com/security/cve/CVE-2014-6277/", }, { category: "self", summary: "SUSE CVE CVE-2014-6278 page", url: "https://www.suse.com/security/cve/CVE-2014-6278/", }, { category: "self", summary: "SUSE CVE CVE-2014-7169 page", url: "https://www.suse.com/security/cve/CVE-2014-7169/", }, { category: "self", summary: "SUSE CVE CVE-2014-7186 page", url: "https://www.suse.com/security/cve/CVE-2014-7186/", }, { category: "self", summary: "SUSE CVE CVE-2014-7187 page", url: "https://www.suse.com/security/cve/CVE-2014-7187/", }, { category: "self", summary: "SUSE CVE CVE-2016-9401 page", url: "https://www.suse.com/security/cve/CVE-2016-9401/", }, ], title: "bash-4.4-92.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10106-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "bash-4.4-92.1.aarch64", product: { name: "bash-4.4-92.1.aarch64", product_id: "bash-4.4-92.1.aarch64", }, }, { category: "product_version", name: "bash-devel-4.4-92.1.aarch64", product: { name: "bash-devel-4.4-92.1.aarch64", product_id: "bash-devel-4.4-92.1.aarch64", }, }, { category: "product_version", name: "bash-doc-4.4-92.1.aarch64", product: { name: "bash-doc-4.4-92.1.aarch64", product_id: "bash-doc-4.4-92.1.aarch64", }, }, { category: "product_version", name: "bash-lang-4.4-92.1.aarch64", product: { name: "bash-lang-4.4-92.1.aarch64", product_id: "bash-lang-4.4-92.1.aarch64", }, }, { category: "product_version", name: "bash-loadables-4.4-92.1.aarch64", product: { name: "bash-loadables-4.4-92.1.aarch64", product_id: "bash-loadables-4.4-92.1.aarch64", }, }, { category: "product_version", name: "libreadline7-7.0-92.1.aarch64", product: { name: "libreadline7-7.0-92.1.aarch64", product_id: "libreadline7-7.0-92.1.aarch64", }, }, { category: "product_version", name: "libreadline7-32bit-7.0-92.1.aarch64", product: { name: "libreadline7-32bit-7.0-92.1.aarch64", product_id: "libreadline7-32bit-7.0-92.1.aarch64", }, }, { category: "product_version", name: "readline-devel-7.0-92.1.aarch64", product: { name: "readline-devel-7.0-92.1.aarch64", product_id: "readline-devel-7.0-92.1.aarch64", }, }, { category: "product_version", name: "readline-devel-32bit-7.0-92.1.aarch64", product: { name: "readline-devel-32bit-7.0-92.1.aarch64", product_id: "readline-devel-32bit-7.0-92.1.aarch64", }, }, { category: "product_version", name: "readline-doc-7.0-92.1.aarch64", product: { name: "readline-doc-7.0-92.1.aarch64", product_id: "readline-doc-7.0-92.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "bash-4.4-92.1.ppc64le", product: { name: "bash-4.4-92.1.ppc64le", product_id: "bash-4.4-92.1.ppc64le", }, }, { category: "product_version", name: "bash-devel-4.4-92.1.ppc64le", product: { name: "bash-devel-4.4-92.1.ppc64le", product_id: "bash-devel-4.4-92.1.ppc64le", }, }, { category: "product_version", name: "bash-doc-4.4-92.1.ppc64le", product: { name: "bash-doc-4.4-92.1.ppc64le", product_id: "bash-doc-4.4-92.1.ppc64le", }, }, { category: "product_version", name: "bash-lang-4.4-92.1.ppc64le", product: { name: "bash-lang-4.4-92.1.ppc64le", product_id: "bash-lang-4.4-92.1.ppc64le", }, }, { category: "product_version", name: "bash-loadables-4.4-92.1.ppc64le", product: { name: "bash-loadables-4.4-92.1.ppc64le", product_id: "bash-loadables-4.4-92.1.ppc64le", }, }, { category: "product_version", name: "libreadline7-7.0-92.1.ppc64le", product: { name: "libreadline7-7.0-92.1.ppc64le", product_id: "libreadline7-7.0-92.1.ppc64le", }, }, { category: "product_version", name: "libreadline7-32bit-7.0-92.1.ppc64le", product: { name: "libreadline7-32bit-7.0-92.1.ppc64le", product_id: "libreadline7-32bit-7.0-92.1.ppc64le", }, }, { category: "product_version", name: "readline-devel-7.0-92.1.ppc64le", product: { name: "readline-devel-7.0-92.1.ppc64le", product_id: "readline-devel-7.0-92.1.ppc64le", }, }, { category: "product_version", name: "readline-devel-32bit-7.0-92.1.ppc64le", product: { name: "readline-devel-32bit-7.0-92.1.ppc64le", product_id: "readline-devel-32bit-7.0-92.1.ppc64le", }, }, { category: "product_version", name: "readline-doc-7.0-92.1.ppc64le", product: { name: "readline-doc-7.0-92.1.ppc64le", product_id: "readline-doc-7.0-92.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "bash-4.4-92.1.s390x", product: { name: "bash-4.4-92.1.s390x", product_id: "bash-4.4-92.1.s390x", }, }, { category: "product_version", name: "bash-devel-4.4-92.1.s390x", product: { name: "bash-devel-4.4-92.1.s390x", product_id: "bash-devel-4.4-92.1.s390x", }, }, { category: "product_version", name: "bash-doc-4.4-92.1.s390x", product: { name: "bash-doc-4.4-92.1.s390x", product_id: "bash-doc-4.4-92.1.s390x", }, }, { category: "product_version", name: "bash-lang-4.4-92.1.s390x", product: { name: "bash-lang-4.4-92.1.s390x", product_id: "bash-lang-4.4-92.1.s390x", }, }, { category: "product_version", name: "bash-loadables-4.4-92.1.s390x", product: { name: "bash-loadables-4.4-92.1.s390x", product_id: "bash-loadables-4.4-92.1.s390x", }, }, { category: "product_version", name: "libreadline7-7.0-92.1.s390x", product: { name: "libreadline7-7.0-92.1.s390x", product_id: "libreadline7-7.0-92.1.s390x", }, }, { category: "product_version", name: "libreadline7-32bit-7.0-92.1.s390x", product: { name: "libreadline7-32bit-7.0-92.1.s390x", product_id: "libreadline7-32bit-7.0-92.1.s390x", }, }, { category: "product_version", name: "readline-devel-7.0-92.1.s390x", product: { name: "readline-devel-7.0-92.1.s390x", product_id: "readline-devel-7.0-92.1.s390x", }, }, { category: "product_version", name: "readline-devel-32bit-7.0-92.1.s390x", product: { name: "readline-devel-32bit-7.0-92.1.s390x", product_id: "readline-devel-32bit-7.0-92.1.s390x", }, }, { category: "product_version", name: "readline-doc-7.0-92.1.s390x", product: { name: "readline-doc-7.0-92.1.s390x", product_id: "readline-doc-7.0-92.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "bash-4.4-92.1.x86_64", product: { name: "bash-4.4-92.1.x86_64", product_id: "bash-4.4-92.1.x86_64", }, }, { category: "product_version", name: "bash-devel-4.4-92.1.x86_64", product: { name: "bash-devel-4.4-92.1.x86_64", product_id: "bash-devel-4.4-92.1.x86_64", }, }, { category: "product_version", name: "bash-doc-4.4-92.1.x86_64", product: { name: "bash-doc-4.4-92.1.x86_64", product_id: "bash-doc-4.4-92.1.x86_64", }, }, { category: "product_version", name: "bash-lang-4.4-92.1.x86_64", product: { name: "bash-lang-4.4-92.1.x86_64", product_id: "bash-lang-4.4-92.1.x86_64", }, }, { category: "product_version", name: "bash-loadables-4.4-92.1.x86_64", product: { name: "bash-loadables-4.4-92.1.x86_64", product_id: "bash-loadables-4.4-92.1.x86_64", }, }, { category: "product_version", name: "libreadline7-7.0-92.1.x86_64", product: { name: "libreadline7-7.0-92.1.x86_64", product_id: "libreadline7-7.0-92.1.x86_64", }, }, { category: "product_version", name: "libreadline7-32bit-7.0-92.1.x86_64", product: { name: "libreadline7-32bit-7.0-92.1.x86_64", product_id: "libreadline7-32bit-7.0-92.1.x86_64", }, }, { category: "product_version", name: "readline-devel-7.0-92.1.x86_64", product: { name: "readline-devel-7.0-92.1.x86_64", product_id: "readline-devel-7.0-92.1.x86_64", }, }, { category: "product_version", name: "readline-devel-32bit-7.0-92.1.x86_64", product: { name: "readline-devel-32bit-7.0-92.1.x86_64", product_id: "readline-devel-32bit-7.0-92.1.x86_64", }, }, { category: "product_version", name: "readline-doc-7.0-92.1.x86_64", product: { name: "readline-doc-7.0-92.1.x86_64", product_id: "readline-doc-7.0-92.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bash-4.4-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", }, product_reference: "bash-4.4-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-4.4-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", }, product_reference: "bash-4.4-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-4.4-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-4.4-92.1.s390x", }, product_reference: "bash-4.4-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-4.4-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", }, product_reference: "bash-4.4-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-devel-4.4-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", }, product_reference: "bash-devel-4.4-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-devel-4.4-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", }, product_reference: "bash-devel-4.4-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-devel-4.4-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", }, product_reference: "bash-devel-4.4-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-devel-4.4-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", }, product_reference: "bash-devel-4.4-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-doc-4.4-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", }, product_reference: "bash-doc-4.4-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-doc-4.4-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", }, product_reference: "bash-doc-4.4-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-doc-4.4-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", }, product_reference: "bash-doc-4.4-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-doc-4.4-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", }, product_reference: "bash-doc-4.4-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-lang-4.4-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", }, product_reference: "bash-lang-4.4-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-lang-4.4-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", }, product_reference: "bash-lang-4.4-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-lang-4.4-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", }, product_reference: "bash-lang-4.4-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-lang-4.4-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", }, product_reference: "bash-lang-4.4-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-loadables-4.4-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", }, product_reference: "bash-loadables-4.4-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-loadables-4.4-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", }, product_reference: "bash-loadables-4.4-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-loadables-4.4-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", }, product_reference: "bash-loadables-4.4-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-loadables-4.4-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", }, product_reference: "bash-loadables-4.4-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libreadline7-7.0-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", }, product_reference: "libreadline7-7.0-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libreadline7-7.0-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", }, product_reference: "libreadline7-7.0-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libreadline7-7.0-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", }, product_reference: "libreadline7-7.0-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libreadline7-7.0-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", }, product_reference: "libreadline7-7.0-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libreadline7-32bit-7.0-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", }, product_reference: "libreadline7-32bit-7.0-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libreadline7-32bit-7.0-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", }, product_reference: "libreadline7-32bit-7.0-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libreadline7-32bit-7.0-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", }, product_reference: "libreadline7-32bit-7.0-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libreadline7-32bit-7.0-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", }, product_reference: "libreadline7-32bit-7.0-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-devel-7.0-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", }, product_reference: "readline-devel-7.0-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-devel-7.0-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", }, product_reference: "readline-devel-7.0-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-devel-7.0-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", }, product_reference: "readline-devel-7.0-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-devel-7.0-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", }, product_reference: "readline-devel-7.0-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-devel-32bit-7.0-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", }, product_reference: "readline-devel-32bit-7.0-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-devel-32bit-7.0-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", }, product_reference: "readline-devel-32bit-7.0-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-devel-32bit-7.0-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", }, product_reference: "readline-devel-32bit-7.0-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-devel-32bit-7.0-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", }, product_reference: "readline-devel-32bit-7.0-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-doc-7.0-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", }, product_reference: "readline-doc-7.0-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-doc-7.0-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", }, product_reference: "readline-doc-7.0-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-doc-7.0-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", }, product_reference: "readline-doc-7.0-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-doc-7.0-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", }, product_reference: "readline-doc-7.0-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2014-2524", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-2524", }, ], notes: [ { category: "general", text: "The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-2524", url: "https://www.suse.com/security/cve/CVE-2014-2524", }, { category: "external", summary: "SUSE Bug 868822 for CVE-2014-2524", url: "https://bugzilla.suse.com/868822", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2014-2524", }, { cve: "CVE-2014-6271", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6271", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6271", url: "https://www.suse.com/security/cve/CVE-2014-6271", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-6271", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 1130324 for CVE-2014-6271", url: "https://bugzilla.suse.com/1130324", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2014-6271", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 896776 for CVE-2014-6271", url: "https://bugzilla.suse.com/896776", }, { category: "external", summary: "SUSE Bug 898346 for CVE-2014-6271", url: "https://bugzilla.suse.com/898346", }, { category: "external", summary: "SUSE Bug 898604 for CVE-2014-6271", url: "https://bugzilla.suse.com/898604", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6271", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6271", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6271", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-6271", url: "https://bugzilla.suse.com/900454", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2014-6271", }, { cve: "CVE-2014-6277", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6277", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6277", url: "https://www.suse.com/security/cve/CVE-2014-6277", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6277", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6277", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6277", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-6277", url: "https://bugzilla.suse.com/900454", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2014-6277", }, { cve: "CVE-2014-6278", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6278", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6278", url: "https://www.suse.com/security/cve/CVE-2014-6278", }, { category: "external", summary: "SUSE Bug 898604 for CVE-2014-6278", url: "https://bugzilla.suse.com/898604", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6278", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6278", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6278", url: "https://bugzilla.suse.com/900127", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2014-6278", }, { cve: "CVE-2014-7169", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7169", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7169", url: "https://www.suse.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-7169", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 1130324 for CVE-2014-7169", url: "https://bugzilla.suse.com/1130324", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2014-7169", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 896776 for CVE-2014-7169", url: "https://bugzilla.suse.com/896776", }, { category: "external", summary: "SUSE Bug 898346 for CVE-2014-7169", url: "https://bugzilla.suse.com/898346", }, { category: "external", summary: "SUSE Bug 898762 for CVE-2014-7169", url: "https://bugzilla.suse.com/898762", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-7169", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-7169", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 899039 for CVE-2014-7169", url: "https://bugzilla.suse.com/899039", }, { category: "external", summary: "SUSE Bug 899266 for CVE-2014-7169", url: "https://bugzilla.suse.com/899266", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-7169", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-7169", url: "https://bugzilla.suse.com/900454", }, { category: "external", summary: "SUSE Bug 902237 for CVE-2014-7169", url: "https://bugzilla.suse.com/902237", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2014-7169", }, { cve: "CVE-2014-7186", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7186", }, ], notes: [ { category: "general", text: "The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the \"redir_stack\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7186", url: "https://www.suse.com/security/cve/CVE-2014-7186", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-7186", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 898603 for CVE-2014-7186", url: "https://bugzilla.suse.com/898603", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-7186", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-7186", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 899039 for CVE-2014-7186", url: "https://bugzilla.suse.com/899039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-7186", }, { cve: "CVE-2014-7187", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7187", }, ], notes: [ { category: "general", text: "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7187", url: "https://www.suse.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-7187", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 898603 for CVE-2014-7187", url: "https://bugzilla.suse.com/898603", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-7187", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-7187", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 899039 for CVE-2014-7187", url: "https://bugzilla.suse.com/899039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-7187", }, { cve: "CVE-2016-9401", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9401", }, ], notes: [ { category: "general", text: "popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9401", url: "https://www.suse.com/security/cve/CVE-2016-9401", }, { category: "external", summary: "SUSE Bug 1010845 for CVE-2016-9401", url: "https://bugzilla.suse.com/1010845", }, { category: "external", summary: "SUSE Bug 1044328 for CVE-2016-9401", url: "https://bugzilla.suse.com/1044328", }, { category: "external", summary: "SUSE Bug 1123788 for CVE-2016-9401", url: "https://bugzilla.suse.com/1123788", }, { category: "external", summary: "SUSE Bug 1159416 for CVE-2016-9401", url: "https://bugzilla.suse.com/1159416", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2016-9401", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.