Action not permitted
Modal body text goes here.
CVE-2019-3842
Vulnerability from cvelistv5
▼ | Vendor | Product |
---|---|---|
The systemd Project | systemd |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:19:18.556Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842" }, { "name": "FEDORA-2019-3fa5db9e19", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/" }, { "name": "46743", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/46743/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html" }, { "name": "[debian-lts-announce] 20190424 [SECURITY] [DLA 1762-1] systemd security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html" }, { "name": "openSUSE-SU-2019:1450", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "systemd", "vendor": "The systemd Project", "versions": [ { "status": "affected", "version": "v242-rc4" } ] } ], "descriptions": [ { "lang": "en", "value": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\"." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-29T14:08:37", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842" }, { "name": "FEDORA-2019-3fa5db9e19", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/" }, { "name": "46743", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/46743/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html" }, { "name": "[debian-lts-announce] 20190424 [SECURITY] [DLA 1762-1] systemd security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html" }, { "name": "openSUSE-SU-2019:1450", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2019-3842", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "systemd", "version": { "version_data": [ { "version_value": "v242-rc4" } ] } } ] }, "vendor_name": "The systemd Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\"." } ] }, "impact": { "cvss": [ [ { "vectorString": "4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-285" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842" }, { "name": "FEDORA-2019-3fa5db9e19", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/" }, { "name": "46743", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/46743/" }, { "name": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html" }, { "name": "[debian-lts-announce] 20190424 [SECURITY] [DLA 1762-1] systemd security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html" }, { "name": "openSUSE-SU-2019:1450", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-3842", "datePublished": "2019-04-09T20:25:01", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-08-04T19:19:18.556Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-3842\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2019-04-09T21:29:03.443\",\"lastModified\":\"2023-11-07T03:10:13.917\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \\\"allow_active\\\" element rather than \\\"allow_any\\\".\"},{\"lang\":\"es\",\"value\":\"En systemd anterior de la versi\u00f3n v242-rc4, fue encontrado que pam_systemd no sanea apropiadamente el entorno anterior usando la variable XDG_SEAT. Es posible que un atacante, en ciertas configuraciones particulares, establezca una variable de entorno XDG_SEAT que permita comprobar los comandos contra las pol\u00edticas polkit utilizando el elemento \\\"allow_active\\\" en lugar de \\\"allow_any\\\".\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\",\"baseScore\":4.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.0,\"impactScore\":3.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:P/A:P\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":4.4},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-863\"}]},{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-285\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"241\",\"matchCriteriaId\":\"02E0A07B-34D3-403B-A503-CB11C9203FE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:systemd_project:systemd:242:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E2ACFB1-6787-47D0-B7F3-CF4F129732A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:systemd_project:systemd:242:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"22EB9C1F-9101-4AD5-80FD-CB5EA224A13F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:systemd_project:systemd:242:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A203307-2242-475A-8ADF-3A1D112655D5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.exploit-db.com/exploits/46743/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]}]}}" } }
gsd-2019-3842
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2019-3842", "description": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", "id": "GSD-2019-3842", "references": [ "https://www.suse.com/security/cve/CVE-2019-3842.html", "https://www.debian.org/security/2019/dsa-4428", "https://access.redhat.com/errata/RHSA-2021:3900", "https://access.redhat.com/errata/RHSA-2021:1611", "https://ubuntu.com/security/CVE-2019-3842", "https://linux.oracle.com/cve/CVE-2019-3842.html", "https://packetstormsecurity.com/files/cve/CVE-2019-3842" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-3842" ], "details": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", "id": "GSD-2019-3842", "modified": "2023-12-13T01:24:04.749632Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2019-3842", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "systemd", "version": { "version_data": [ { "version_value": "v242-rc4" } ] } } ] }, "vendor_name": "The systemd Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\"." } ] }, "impact": { "cvss": [ [ { "vectorString": "4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-285" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842" }, { "name": "FEDORA-2019-3fa5db9e19", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/" }, { "name": "46743", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/46743/" }, { "name": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html" }, { "name": "[debian-lts-announce] 20190424 [SECURITY] [DLA 1762-1] systemd security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html" }, { "name": "openSUSE-SU-2019:1450", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:systemd_project:systemd:242:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:systemd_project:systemd:242:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:systemd_project:systemd:242:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "241", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2019-3842" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\"." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-863" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842" }, { "name": "FEDORA-2019-3fa5db9e19", "refsource": "FEDORA", "tags": [ "Mailing List", "Release Notes", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/" }, { "name": "46743", "refsource": "EXPLOIT-DB", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/46743/" }, { "name": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html" }, { "name": "[debian-lts-announce] 20190424 [SECURITY] [DLA 1762-1] systemd security update", "refsource": "MLIST", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html" }, { "name": "openSUSE-SU-2019:1450", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html" }, { "name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "tags": [ "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", "refsource": "MLIST", "tags": [ "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9 } }, "lastModifiedDate": "2022-01-31T18:51Z", "publishedDate": "2019-04-09T21:29Z" } } }
var-201904-0347
Vulnerability from variot
In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any". systemd Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Systemd is a Linux-based system and service manager for Lennart Poettering software developers in Germany. The product is compatible with SysV and LSB startup scripts and provides a framework for representing dependencies between system services. A license and access control vulnerability exists in the systemdv242-rc4 release that stems from the lack of effective permissions and access control measures for network systems or products. An attacker could exploit this vulnerability to gain access to webmasters. Bugs fixed (https://bugzilla.redhat.com/):
1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: Red Hat OpenShift Container Storage 4.6.5 security and bug fix update Advisory ID: RHSA-2021:2479-01 Product: Red Hat OpenShift Container Storage Advisory URL: https://access.redhat.com/errata/RHSA-2021:2479 Issue date: 2021-06-17 CVE Names: CVE-2016-10228 CVE-2017-14502 CVE-2019-2708 CVE-2019-3842 CVE-2019-9169 CVE-2019-13012 CVE-2019-14866 CVE-2019-25013 CVE-2020-8231 CVE-2020-8284 CVE-2020-8285 CVE-2020-8286 CVE-2020-8927 CVE-2020-9948 CVE-2020-9951 CVE-2020-9983 CVE-2020-13434 CVE-2020-13543 CVE-2020-13584 CVE-2020-13776 CVE-2020-15358 CVE-2020-24977 CVE-2020-25659 CVE-2020-25678 CVE-2020-26116 CVE-2020-26137 CVE-2020-27618 CVE-2020-27619 CVE-2020-27783 CVE-2020-28196 CVE-2020-29361 CVE-2020-29362 CVE-2020-29363 CVE-2020-36242 CVE-2021-3139 CVE-2021-3177 CVE-2021-3326 CVE-2021-3449 CVE-2021-3450 CVE-2021-3528 CVE-2021-20305 CVE-2021-23239 CVE-2021-23240 CVE-2021-23336 ==================================================================== 1. Summary:
Updated images that fix one security issue and several bugs are now available for Red Hat OpenShift Container Storage 4.6.5 on Red Hat Enterprise Linux 8 from Red Hat Container Registry.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Description:
Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.
Security Fix(es):
- NooBaa: noobaa-operator leaking RPC AuthToken into log files (CVE-2021-3528)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
Currently, a newly restored PVC cannot be mounted if some of the OpenShift Container Platform nodes are running on a version of Red Hat Enterprise Linux which is less than 8.2, and the snapshot from which the PVC was restored is deleted. Workaround: Do not delete the snapshot from which the PVC was restored until the restored PVC is deleted. (BZ#1962483)
-
Previously, the default backingstore was not created on AWS S3 when OpenShift Container Storage was deployed, due to incorrect identification of AWS S3. With this update, the default backingstore gets created when OpenShift Container Storage is deployed on AWS S3. (BZ#1927307)
-
Previously, log messages were printed to the endpoint pod log even if the debug option was not set. With this update, the log messages are printed to the endpoint pod log only when the debug option is set. (BZ#1938106)
-
Previously, the PVCs could not be provisioned as the
rook-ceph-mds
did not register the pod IP on the monitor servers, and hence every mount on the filesystem timed out, resulting in CephFS volume provisioning failure. With this update, an argument--public-addr=podIP
is added to the MDS pod when the host network is not enabled, and hence the CephFS volume provisioning does not fail. (BZ#1949558) -
Previously, OpenShift Container Storage 4.2 clusters were not updated with the correct cache value, and hence MDSs in standby-replay might report an oversized cache, as rook did not apply the
mds_cache_memory_limit
argument during upgrades. With this update, themds_cache_memory_limit
argument is applied during upgrades and the mds daemon operates normally. (BZ#1951348) -
Previously, the coredumps were not generated in the correct location as rook was setting the config option
log_file
to an empty string since logging happened on stdout and not on the files, and hence Ceph read the value of thelog_file
to build the dump path. With this update, rook does not set thelog_file
and keeps Ceph's internal default, and hence the coredumps are generated in the correct location and are accessible under/var/log/ceph/
. (BZ#1938049) -
Previously, Ceph became inaccessible, as the mons lose quorum if a mon pod was drained while another mon was failing over. With this update, voluntary mon drains are prevented while a mon is failing over, and hence Ceph does not become inaccessible. (BZ#1946573)
-
Previously, the mon quorum was at risk, as the operator could erroneously remove the new mon if the operator was restarted during a mon failover. With this update, the operator completes the same mon failover after the operator is restarted, and hence the mon quorum is more reliable in the node drains and mon failover scenarios. (BZ#1959983)
All users of Red Hat OpenShift Container Storage are advised to pull these new images from the Red Hat Container Registry.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1938106 - [GSS][RFE]Reduce debug level for logs of Nooba Endpoint pod 1950915 - XSS Vulnerability with Noobaa version 5.5.0-3bacc6b 1951348 - [GSS][CephFS] health warning "MDS cache is too large (3GB/1GB); 0 inodes in use by clients, 0 stray files" for the standby-replay 1951600 - [4.6.z][Clone of BZ #1936545] setuid and setgid file bits are not retained after a OCS CephFS CSI restore 1955601 - CVE-2021-3528 NooBaa: noobaa-operator leaking RPC AuthToken into log files 1957189 - [Rebase] Use RHCS4.2z1 container image with OCS 4..6.5[may require doc update for external mode min supported RHCS version] 1959980 - When a node is being drained, increase the mon failover timeout to prevent unnecessary mon failover 1959983 - [GSS][mon] rook-operator scales mons to 4 after healthCheck timeout 1962483 - [RHEL7][RBD][4.6.z clone] FailedMount error when using restored PVC on app pod
- References:
https://access.redhat.com/security/cve/CVE-2016-10228 https://access.redhat.com/security/cve/CVE-2017-14502 https://access.redhat.com/security/cve/CVE-2019-2708 https://access.redhat.com/security/cve/CVE-2019-3842 https://access.redhat.com/security/cve/CVE-2019-9169 https://access.redhat.com/security/cve/CVE-2019-13012 https://access.redhat.com/security/cve/CVE-2019-14866 https://access.redhat.com/security/cve/CVE-2019-25013 https://access.redhat.com/security/cve/CVE-2020-8231 https://access.redhat.com/security/cve/CVE-2020-8284 https://access.redhat.com/security/cve/CVE-2020-8285 https://access.redhat.com/security/cve/CVE-2020-8286 https://access.redhat.com/security/cve/CVE-2020-8927 https://access.redhat.com/security/cve/CVE-2020-9948 https://access.redhat.com/security/cve/CVE-2020-9951 https://access.redhat.com/security/cve/CVE-2020-9983 https://access.redhat.com/security/cve/CVE-2020-13434 https://access.redhat.com/security/cve/CVE-2020-13543 https://access.redhat.com/security/cve/CVE-2020-13584 https://access.redhat.com/security/cve/CVE-2020-13776 https://access.redhat.com/security/cve/CVE-2020-15358 https://access.redhat.com/security/cve/CVE-2020-24977 https://access.redhat.com/security/cve/CVE-2020-25659 https://access.redhat.com/security/cve/CVE-2020-25678 https://access.redhat.com/security/cve/CVE-2020-26116 https://access.redhat.com/security/cve/CVE-2020-26137 https://access.redhat.com/security/cve/CVE-2020-27618 https://access.redhat.com/security/cve/CVE-2020-27619 https://access.redhat.com/security/cve/CVE-2020-27783 https://access.redhat.com/security/cve/CVE-2020-28196 https://access.redhat.com/security/cve/CVE-2020-29361 https://access.redhat.com/security/cve/CVE-2020-29362 https://access.redhat.com/security/cve/CVE-2020-29363 https://access.redhat.com/security/cve/CVE-2020-36242 https://access.redhat.com/security/cve/CVE-2021-3139 https://access.redhat.com/security/cve/CVE-2021-3177 https://access.redhat.com/security/cve/CVE-2021-3326 https://access.redhat.com/security/cve/CVE-2021-3449 https://access.redhat.com/security/cve/CVE-2021-3450 https://access.redhat.com/security/cve/CVE-2021-3528 https://access.redhat.com/security/cve/CVE-2021-20305 https://access.redhat.com/security/cve/CVE-2021-23239 https://access.redhat.com/security/cve/CVE-2021-23240 https://access.redhat.com/security/cve/CVE-2021-23336 https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYMtu/9zjgjWX9erEAQh6fhAAm9UPxF0e8ubzCEae+bkQAduwCkzpQ0ND Q1/UcDAAc4ueEhBrwXPhOLrgfBj+VG+QA19YZcNPzbW7I48RGjCm5WccnUyEbFAo FKTspCZW7FkXKBU15u58c/sFCGa4/Yuu+IpqCMuZ6lR2g9WHIBKdVtaB4y59AyfS v59cAorqZ3AoTX4lVys6HfDGySQWlg5P8t6ST72cUJjESi6U0HV00P7ECU2SFxCF HXA4gbXbZ1EPb/1+UkRRnXemJuT8SaRFRTrzj9woTrVAGQFvn+yjxLbZxVZb0WDd 6QeNpiJNICfL+/ExvEmGQucf7NcekYPWud11pnRUfQ+Uqsj+I7YoaepXAAolLzvN kAVVpFNsWADOVz7BrfSKoo4b38UCFOEUSd2d1ijCNE96Q9XyNUpn+kZqz0/wpBQC L+E5N9kEuaLyDBoI0wJAfoqU1NY4Cvl6lIMDgHUv2CE10zxhFwHCDulAfcQgxNQG sIbpSgSegq9HfZSDxa6Rtrox1I7oGhnBy10sIwUUH1+fxAusUk+Xrxf8hUv8KgDz V144yrGwN/6KVxh74A60bJX3ai12l6fC8bkmsxg5K1r/Dk4tUkQeXNdBbaK/rEKO AQs7YDab/0VA2qKtXDRkbnzqBRSbamDNOO/jd28nGMoclaIRHCzQgJRFv6Qb6dwT RCrstqAM5QQ=DHD0 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce .
Bug Fix(es):
-
WMCO patch pub-key-hash annotation to Linux node (BZ#1945248)
-
LoadBalancer Service type with invalid external loadbalancer IP breaks the datapath (BZ#1952917)
-
Telemetry info not completely available to identify windows nodes (BZ#1955319)
-
WMCO incorrectly shows node as ready after a failed configuration (BZ#1956412)
-
kube-proxy service terminated unexpectedly after recreated LB service (BZ#1963263)
-
Solution:
For Windows Machine Config Operator upgrades, see the following documentation:
https://docs.openshift.com/container-platform/4.7/windows_containers/window s-node-upgrades.html
- Bugs fixed (https://bugzilla.redhat.com/):
1945248 - WMCO patch pub-key-hash annotation to Linux node 1946538 - CVE-2021-25736 kubernetes: LoadBalancer Service type don't create a HNS policy for empty or invalid external loadbalancer IP, what could lead to MITM 1952917 - LoadBalancer Service type with invalid external loadbalancer IP breaks the datapath 1955319 - Telemetry info not completely available to identify windows nodes 1956412 - WMCO incorrectly shows node as ready after a failed configuration 1963263 - kube-proxy service terminated unexpectedly after recreated LB service
- Bugs fixed (https://bugzilla.redhat.com/):
1897635 - CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers 1918750 - CVE-2021-3114 golang: crypto/elliptic: incorrect operations on the P-224 curve 1928172 - CVE-2020-13949 libthrift: potential DoS when processing untrusted payloads 1928937 - CVE-2021-23337 nodejs-lodash: command injection via template 1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions
- Description:
Red Hat Advanced Cluster Management for Kubernetes 2.2.4 images
Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana gement_for_kubernetes/2.2/html/release_notes/
Security fixes:
-
redisgraph-tls: redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms (CVE-2021-21309)
-
console-header-container: nodejs-netmask: improper input validation of octal input data (CVE-2021-28092)
-
console-container: nodejs-is-svg: ReDoS via malicious string (CVE-2021-28918)
Bug fixes:
-
RHACM 2.2.4 images (BZ# 1957254)
-
Enabling observability for OpenShift Container Storage with RHACM 2.2 on OCP 4.7 (BZ#1950832)
-
ACM Operator should support using the default route TLS (BZ# 1955270)
-
The scrolling bar for search filter does not work properly (BZ# 1956852)
-
Limits on Length of MultiClusterObservability Resource Name (BZ# 1959426)
-
The proxy setup in install-config.yaml is not worked when IPI installing with RHACM (BZ# 1960181)
-
Unable to make SSH connection to a Bitbucket server (BZ# 1966513)
-
Observability Thanos store shard crashing - cannot unmarshall DNS message (BZ# 1967890)
-
Bugs fixed (https://bugzilla.redhat.com/):
1932634 - CVE-2021-21309 redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms 1939103 - CVE-2021-28092 nodejs-is-svg: ReDoS via malicious string 1944827 - CVE-2021-28918 nodejs-netmask: improper input validation of octal input data 1950832 - Enabling observability for OpenShift Container Storage with RHACM 2.2 on OCP 4.7 1952150 - [DDF] It would be great to see all the options available for the bucket configuration and which attributes are mandatory 1954506 - [DDF] Table does not contain data about 20 clusters. Now it's difficult to estimate CPU usage with larger clusters 1954535 - Reinstall Submariner - No endpoints found on one cluster 1955270 - ACM Operator should support using the default route TLS 1956852 - The scrolling bar for search filter does not work properly 1957254 - RHACM 2.2.4 images 1959426 - Limits on Length of MultiClusterObservability Resource Name 1960181 - The proxy setup in install-config.yaml is not worked when IPI installing with RHACM. 1963128 - [DDF] Please rename this to "Amazon Elastic Kubernetes Service" 1966513 - Unable to make SSH connection to a Bitbucket server 1967357 - [DDF] When I clicked on this yaml, I get a HTTP 404 error. 1967890 - Observability Thanos store shard crashing - cannot unmarshal DNS message
- Bugs fixed (https://bugzilla.redhat.com/):
1937901 - CVE-2021-27918 golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader 1958341 - CVE-2021-31525 golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header 1965503 - CVE-2021-33196 golang: archive/zip: Malformed archive may cause panic or memory exhaustion 1971445 - Release of OpenShift Serverless Serving 1.16.0 1971448 - Release of OpenShift Serverless Eventing 1.16.0
- See the following advisory for the RPM packages for this release:
https://access.redhat.com/errata/RHSA-2021:2122
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html
This update fixes the following bug among others:
- Previously, resources for the ClusterOperator were being created early in the update process, which led to update failures when the ClusterOperator had no status condition while Operators were updating. This bug fix changes the timing of when these resources are created. As a result, updates can take place without errors. (BZ#1959238)
Security Fix(es):
- gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)
You may download the oc tool and use it to inspect release image metadata as follows:
(For x86_64 architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.13-x86_64
The image digest is sha256:783a2c963f35ccab38e82e6a8c7fa954c3a4551e07d2f43c06098828dd986ed4
(For s390x architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.13-s390x
The image digest is sha256:4cf44e68413acad063203e1ee8982fd01d8b9c1f8643a5b31cd7ff341b3199cd
(For ppc64le architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.13-ppc64le
The image digest is sha256:d47ce972f87f14f1f3c5d50428d2255d1256dae3f45c938ace88547478643e36
All OpenShift Container Platform 4.7 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor
- Solution:
For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html
Details on how to access this content are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -cli.html
- Bugs fixed (https://bugzilla.redhat.com/):
1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 1923268 - [Assisted-4.7] [Staging] Using two both spelling "canceled" "cancelled" 1947216 - [AWS] Missing iam:ListAttachedRolePolicies permission in permissions.go 1953963 - Enable/Disable host operations returns cluster resource with incomplete hosts list 1957749 - ovn-kubernetes pod should have CPU and memory requests set but not limits 1959238 - CVO creating cloud-controller-manager too early causing upgrade failures 1960103 - SR-IOV obliviously reboot the node 1961941 - Local Storage Operator using LocalVolume CR fails to create PV's when backend storage failure is simulated 1962302 - packageserver clusteroperator does not set reason or message for Available condition 1962312 - Deployment considered unhealthy despite being available and at latest generation 1962435 - Public DNS records were not deleted when destroying a cluster which is using byo private hosted zone 1963115 - Test verify /run filesystem contents failing
- Summary:
Release of components for the Service Telemetry Framework
- Description:
Service Telemetry Framework (STF) provides automated collection of measurements and data from remote clients, such as Red Hat OpenStack Platform or third-party nodes.
Bug fixes:
-
STF 1.3.3 now supports OpenShift Container Platform 4.8 as an installation platform. (BZ#2013268)
-
With this update, the servicetelemetrys.infra.watch CRD has a validation that limits the clouds[].name to 10 characters and alphanumeric to avoid issues with extra characters in the cloud name and names being too long. (BZ#2011603)
-
Previously, when you installed STF without having Elastic Cloud on Kubernetes (ECK) Operator installed, the following error message was returned: "Failed to find exact match for elasticsearch.k8s.elastic.co/v1beta1.Elasticsearch". The error was as a result of Service Telemetry Operator trying to look up information from a non-existent API interface.
With this update, the Service Telemetry Operator verifies that the API exists before it attempts to make requests to the API interface that is provided by ECK. (BZ#1959166)
- Dockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally. Bugs fixed (https://bugzilla.redhat.com/):
1959166 - Service Telemetry Operator can error out if ElasticSearch (ECK) CRD is not installed 1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic 2011603 - STF multi-cloud setup misinterprets name if a "-" is being used 2013268 - [RFE] Support STF 1.3 on OCP 4.8
5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201904-0347", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "systemd", "scope": "eq", "trust": 1.0, "vendor": "systemd", "version": "242" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "30" }, { "model": "systemd", "scope": "lte", "trust": 1.0, "vendor": "systemd", "version": "241" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "gnu/linux", "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": "fedora", "scope": null, "trust": 0.8, "vendor": "fedora", "version": null }, { "model": "systemd", "scope": "lt", "trust": 0.8, "vendor": "systemd", "version": "242-rc4" }, { "model": "enterprise linux", "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": "v242-rc4", "scope": null, "trust": 0.6, "vendor": "systemd", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-14937" }, { "db": "JVNDB", "id": "JVNDB-2019-003372" }, { "db": "NVD", "id": "CVE-2019-3842" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:systemd_project:systemd:242:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:systemd_project:systemd:242:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:systemd_project:systemd:242:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "241", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-3842" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "162837" }, { "db": "PACKETSTORM", "id": "163209" }, { "db": "PACKETSTORM", "id": "163257" }, { "db": "PACKETSTORM", "id": "163276" }, { "db": "PACKETSTORM", "id": "163188" }, { "db": "PACKETSTORM", "id": "163496" }, { "db": "PACKETSTORM", "id": "162877" }, { "db": "PACKETSTORM", "id": "164901" } ], "trust": 0.8 }, "cve": "CVE-2019-3842", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-3842", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "CNVD-2019-14937", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.0, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "secalert@redhat.com", "availabilityImpact": "LOW", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.0, "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.0, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-3842", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-3842", "trust": 1.8, "value": "HIGH" }, { "author": "secalert@redhat.com", "id": "CVE-2019-3842", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2019-14937", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201904-418", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-3842", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-14937" }, { "db": "VULMON", "id": "CVE-2019-3842" }, { "db": "JVNDB", "id": "JVNDB-2019-003372" }, { "db": "CNNVD", "id": "CNNVD-201904-418" }, { "db": "NVD", "id": "CVE-2019-3842" }, { "db": "NVD", "id": "CVE-2019-3842" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\". systemd Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Systemd is a Linux-based system and service manager for Lennart Poettering software developers in Germany. The product is compatible with SysV and LSB startup scripts and provides a framework for representing dependencies between system services. A license and access control vulnerability exists in the systemdv242-rc4 release that stems from the lack of effective permissions and access control measures for network systems or products. An attacker could exploit this vulnerability to gain access to webmasters. Bugs fixed (https://bugzilla.redhat.com/):\n\n1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation\n\n5. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Moderate: Red Hat OpenShift Container Storage 4.6.5 security and bug fix update\nAdvisory ID: RHSA-2021:2479-01\nProduct: Red Hat OpenShift Container Storage\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:2479\nIssue date: 2021-06-17\nCVE Names: CVE-2016-10228 CVE-2017-14502 CVE-2019-2708\n CVE-2019-3842 CVE-2019-9169 CVE-2019-13012\n CVE-2019-14866 CVE-2019-25013 CVE-2020-8231\n CVE-2020-8284 CVE-2020-8285 CVE-2020-8286\n CVE-2020-8927 CVE-2020-9948 CVE-2020-9951\n CVE-2020-9983 CVE-2020-13434 CVE-2020-13543\n CVE-2020-13584 CVE-2020-13776 CVE-2020-15358\n CVE-2020-24977 CVE-2020-25659 CVE-2020-25678\n CVE-2020-26116 CVE-2020-26137 CVE-2020-27618\n CVE-2020-27619 CVE-2020-27783 CVE-2020-28196\n CVE-2020-29361 CVE-2020-29362 CVE-2020-29363\n CVE-2020-36242 CVE-2021-3139 CVE-2021-3177\n CVE-2021-3326 CVE-2021-3449 CVE-2021-3450\n CVE-2021-3528 CVE-2021-20305 CVE-2021-23239\n CVE-2021-23240 CVE-2021-23336\n====================================================================\n1. Summary:\n\nUpdated images that fix one security issue and several bugs are now\navailable for Red Hat OpenShift Container Storage 4.6.5 on Red Hat\nEnterprise Linux 8 from Red Hat Container Registry. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Description:\n\nRed Hat OpenShift Container Storage is software-defined storage integrated\nwith and optimized for the Red Hat OpenShift Container Platform. Red Hat\nOpenShift Container Storage is a highly scalable, production-grade\npersistent storage for stateful applications running in the Red Hat\nOpenShift Container Platform. In addition to persistent storage, Red Hat\nOpenShift Container Storage provisions a multicloud data management service\nwith an S3 compatible API. \n\nSecurity Fix(es):\n\n* NooBaa: noobaa-operator leaking RPC AuthToken into log files\n(CVE-2021-3528)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. \n\nBug Fix(es):\n\n* Currently, a newly restored PVC cannot be mounted if some of the\nOpenShift Container Platform nodes are running on a version of Red Hat\nEnterprise Linux which is less than 8.2, and the snapshot from which the\nPVC was restored is deleted. \nWorkaround: Do not delete the snapshot from which the PVC was restored\nuntil the restored PVC is deleted. (BZ#1962483)\n\n* Previously, the default backingstore was not created on AWS S3 when\nOpenShift Container Storage was deployed, due to incorrect identification\nof AWS S3. With this update, the default backingstore gets created when\nOpenShift Container Storage is deployed on AWS S3. (BZ#1927307)\n\n* Previously, log messages were printed to the endpoint pod log even if the\ndebug option was not set. With this update, the log messages are printed to\nthe endpoint pod log only when the debug option is set. (BZ#1938106)\n\n* Previously, the PVCs could not be provisioned as the `rook-ceph-mds` did\nnot register the pod IP on the monitor servers, and hence every mount on\nthe filesystem timed out, resulting in CephFS volume provisioning failure. \nWith this update, an argument `--public-addr=podIP` is added to the MDS pod\nwhen the host network is not enabled, and hence the CephFS volume\nprovisioning does not fail. (BZ#1949558)\n\n* Previously, OpenShift Container Storage 4.2 clusters were not updated\nwith the correct cache value, and hence MDSs in standby-replay might report\nan oversized cache, as rook did not apply the `mds_cache_memory_limit`\nargument during upgrades. With this update, the `mds_cache_memory_limit`\nargument is applied during upgrades and the mds daemon operates normally. \n(BZ#1951348)\n\n* Previously, the coredumps were not generated in the correct location as\nrook was setting the config option `log_file` to an empty string since\nlogging happened on stdout and not on the files, and hence Ceph read the\nvalue of the `log_file` to build the dump path. With this update, rook does\nnot set the `log_file` and keeps Ceph\u0027s internal default, and hence the\ncoredumps are generated in the correct location and are accessible under\n`/var/log/ceph/`. (BZ#1938049)\n\n* Previously, Ceph became inaccessible, as the mons lose quorum if a mon\npod was drained while another mon was failing over. With this update,\nvoluntary mon drains are prevented while a mon is failing over, and hence\nCeph does not become inaccessible. (BZ#1946573)\n\n* Previously, the mon quorum was at risk, as the operator could erroneously\nremove the new mon if the operator was restarted during a mon failover. \nWith this update, the operator completes the same mon failover after the\noperator is restarted, and hence the mon quorum is more reliable in the\nnode drains and mon failover scenarios. (BZ#1959983)\n\nAll users of Red Hat OpenShift Container Storage are advised to pull these\nnew images from the Red Hat Container Registry. \n\n3. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1938106 - [GSS][RFE]Reduce debug level for logs of Nooba Endpoint pod\n1950915 - XSS Vulnerability with Noobaa version 5.5.0-3bacc6b\n1951348 - [GSS][CephFS] health warning \"MDS cache is too large (3GB/1GB); 0 inodes in use by clients, 0 stray files\" for the standby-replay\n1951600 - [4.6.z][Clone of BZ #1936545] setuid and setgid file bits are not retained after a OCS CephFS CSI restore\n1955601 - CVE-2021-3528 NooBaa: noobaa-operator leaking RPC AuthToken into log files\n1957189 - [Rebase] Use RHCS4.2z1 container image with OCS 4..6.5[may require doc update for external mode min supported RHCS version]\n1959980 - When a node is being drained, increase the mon failover timeout to prevent unnecessary mon failover\n1959983 - [GSS][mon] rook-operator scales mons to 4 after healthCheck timeout\n1962483 - [RHEL7][RBD][4.6.z clone] FailedMount error when using restored PVC on app pod\n\n5. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-10228\nhttps://access.redhat.com/security/cve/CVE-2017-14502\nhttps://access.redhat.com/security/cve/CVE-2019-2708\nhttps://access.redhat.com/security/cve/CVE-2019-3842\nhttps://access.redhat.com/security/cve/CVE-2019-9169\nhttps://access.redhat.com/security/cve/CVE-2019-13012\nhttps://access.redhat.com/security/cve/CVE-2019-14866\nhttps://access.redhat.com/security/cve/CVE-2019-25013\nhttps://access.redhat.com/security/cve/CVE-2020-8231\nhttps://access.redhat.com/security/cve/CVE-2020-8284\nhttps://access.redhat.com/security/cve/CVE-2020-8285\nhttps://access.redhat.com/security/cve/CVE-2020-8286\nhttps://access.redhat.com/security/cve/CVE-2020-8927\nhttps://access.redhat.com/security/cve/CVE-2020-9948\nhttps://access.redhat.com/security/cve/CVE-2020-9951\nhttps://access.redhat.com/security/cve/CVE-2020-9983\nhttps://access.redhat.com/security/cve/CVE-2020-13434\nhttps://access.redhat.com/security/cve/CVE-2020-13543\nhttps://access.redhat.com/security/cve/CVE-2020-13584\nhttps://access.redhat.com/security/cve/CVE-2020-13776\nhttps://access.redhat.com/security/cve/CVE-2020-15358\nhttps://access.redhat.com/security/cve/CVE-2020-24977\nhttps://access.redhat.com/security/cve/CVE-2020-25659\nhttps://access.redhat.com/security/cve/CVE-2020-25678\nhttps://access.redhat.com/security/cve/CVE-2020-26116\nhttps://access.redhat.com/security/cve/CVE-2020-26137\nhttps://access.redhat.com/security/cve/CVE-2020-27618\nhttps://access.redhat.com/security/cve/CVE-2020-27619\nhttps://access.redhat.com/security/cve/CVE-2020-27783\nhttps://access.redhat.com/security/cve/CVE-2020-28196\nhttps://access.redhat.com/security/cve/CVE-2020-29361\nhttps://access.redhat.com/security/cve/CVE-2020-29362\nhttps://access.redhat.com/security/cve/CVE-2020-29363\nhttps://access.redhat.com/security/cve/CVE-2020-36242\nhttps://access.redhat.com/security/cve/CVE-2021-3139\nhttps://access.redhat.com/security/cve/CVE-2021-3177\nhttps://access.redhat.com/security/cve/CVE-2021-3326\nhttps://access.redhat.com/security/cve/CVE-2021-3449\nhttps://access.redhat.com/security/cve/CVE-2021-3450\nhttps://access.redhat.com/security/cve/CVE-2021-3528\nhttps://access.redhat.com/security/cve/CVE-2021-20305\nhttps://access.redhat.com/security/cve/CVE-2021-23239\nhttps://access.redhat.com/security/cve/CVE-2021-23240\nhttps://access.redhat.com/security/cve/CVE-2021-23336\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n6. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQIVAwUBYMtu/9zjgjWX9erEAQh6fhAAm9UPxF0e8ubzCEae+bkQAduwCkzpQ0ND\nQ1/UcDAAc4ueEhBrwXPhOLrgfBj+VG+QA19YZcNPzbW7I48RGjCm5WccnUyEbFAo\nFKTspCZW7FkXKBU15u58c/sFCGa4/Yuu+IpqCMuZ6lR2g9WHIBKdVtaB4y59AyfS\nv59cAorqZ3AoTX4lVys6HfDGySQWlg5P8t6ST72cUJjESi6U0HV00P7ECU2SFxCF\nHXA4gbXbZ1EPb/1+UkRRnXemJuT8SaRFRTrzj9woTrVAGQFvn+yjxLbZxVZb0WDd\n6QeNpiJNICfL+/ExvEmGQucf7NcekYPWud11pnRUfQ+Uqsj+I7YoaepXAAolLzvN\nkAVVpFNsWADOVz7BrfSKoo4b38UCFOEUSd2d1ijCNE96Q9XyNUpn+kZqz0/wpBQC\nL+E5N9kEuaLyDBoI0wJAfoqU1NY4Cvl6lIMDgHUv2CE10zxhFwHCDulAfcQgxNQG\nsIbpSgSegq9HfZSDxa6Rtrox1I7oGhnBy10sIwUUH1+fxAusUk+Xrxf8hUv8KgDz\nV144yrGwN/6KVxh74A60bJX3ai12l6fC8bkmsxg5K1r/Dk4tUkQeXNdBbaK/rEKO\nAQs7YDab/0VA2qKtXDRkbnzqBRSbamDNOO/jd28nGMoclaIRHCzQgJRFv6Qb6dwT\nRCrstqAM5QQ=DHD0\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nBug Fix(es):\n\n* WMCO patch pub-key-hash annotation to Linux node (BZ#1945248)\n\n* LoadBalancer Service type with invalid external loadbalancer IP breaks\nthe datapath (BZ#1952917)\n\n* Telemetry info not completely available to identify windows nodes\n(BZ#1955319)\n\n* WMCO incorrectly shows node as ready after a failed configuration\n(BZ#1956412)\n\n* kube-proxy service terminated unexpectedly after recreated LB service\n(BZ#1963263)\n\n3. Solution:\n\nFor Windows Machine Config Operator upgrades, see the following\ndocumentation:\n\nhttps://docs.openshift.com/container-platform/4.7/windows_containers/window\ns-node-upgrades.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1945248 - WMCO patch pub-key-hash annotation to Linux node\n1946538 - CVE-2021-25736 kubernetes: LoadBalancer Service type don\u0027t create a HNS policy for empty or invalid external loadbalancer IP, what could lead to MITM\n1952917 - LoadBalancer Service type with invalid external loadbalancer IP breaks the datapath\n1955319 - Telemetry info not completely available to identify windows nodes\n1956412 - WMCO incorrectly shows node as ready after a failed configuration\n1963263 - kube-proxy service terminated unexpectedly after recreated LB service\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1897635 - CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers\n1918750 - CVE-2021-3114 golang: crypto/elliptic: incorrect operations on the P-224 curve\n1928172 - CVE-2020-13949 libthrift: potential DoS when processing untrusted payloads\n1928937 - CVE-2021-23337 nodejs-lodash: command injection via template\n1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions\n\n5. Description:\n\nRed Hat Advanced Cluster Management for Kubernetes 2.2.4 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability\nengineers face as they work across a range of public and private cloud\nenvironments. \nClusters and applications are all visible and managed from a single\nconsole\u2014with security policy built in. See\nthe following Release Notes documentation, which will be updated shortly\nfor\nthis release, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana\ngement_for_kubernetes/2.2/html/release_notes/\n\nSecurity fixes:\n\n* redisgraph-tls: redis: integer overflow when configurable limit for\nmaximum supported bulk input size is too big on 32-bit platforms\n(CVE-2021-21309)\n\n* console-header-container: nodejs-netmask: improper input validation of\noctal input data (CVE-2021-28092)\n\n* console-container: nodejs-is-svg: ReDoS via malicious string\n(CVE-2021-28918)\n\nBug fixes: \n\n* RHACM 2.2.4 images (BZ# 1957254)\n\n* Enabling observability for OpenShift Container Storage with RHACM 2.2 on\nOCP 4.7 (BZ#1950832)\n\n* ACM Operator should support using the default route TLS (BZ# 1955270)\n\n* The scrolling bar for search filter does not work properly (BZ# 1956852)\n\n* Limits on Length of MultiClusterObservability Resource Name (BZ# 1959426)\n\n* The proxy setup in install-config.yaml is not worked when IPI installing\nwith RHACM (BZ# 1960181)\n\n* Unable to make SSH connection to a Bitbucket server (BZ# 1966513)\n\n* Observability Thanos store shard crashing - cannot unmarshall DNS message\n(BZ# 1967890)\n\n3. Bugs fixed (https://bugzilla.redhat.com/):\n\n1932634 - CVE-2021-21309 redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms\n1939103 - CVE-2021-28092 nodejs-is-svg: ReDoS via malicious string\n1944827 - CVE-2021-28918 nodejs-netmask: improper input validation of octal input data\n1950832 - Enabling observability for OpenShift Container Storage with RHACM 2.2 on OCP 4.7\n1952150 - [DDF] It would be great to see all the options available for the bucket configuration and which attributes are mandatory\n1954506 - [DDF] Table does not contain data about 20 clusters. Now it\u0027s difficult to estimate CPU usage with larger clusters\n1954535 - Reinstall Submariner - No endpoints found on one cluster\n1955270 - ACM Operator should support using the default route TLS\n1956852 - The scrolling bar for search filter does not work properly\n1957254 - RHACM 2.2.4 images\n1959426 - Limits on Length of MultiClusterObservability Resource Name\n1960181 - The proxy setup in install-config.yaml is not worked when IPI installing with RHACM. \n1963128 - [DDF] Please rename this to \"Amazon Elastic Kubernetes Service\"\n1966513 - Unable to make SSH connection to a Bitbucket server\n1967357 - [DDF] When I clicked on this yaml, I get a HTTP 404 error. \n1967890 - Observability Thanos store shard crashing - cannot unmarshal DNS message\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1937901 - CVE-2021-27918 golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader\n1958341 - CVE-2021-31525 golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header\n1965503 - CVE-2021-33196 golang: archive/zip: Malformed archive may cause panic or memory exhaustion\n1971445 - Release of OpenShift Serverless Serving 1.16.0\n1971448 - Release of OpenShift Serverless Eventing 1.16.0\n\n5. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHSA-2021:2122\n\nSpace precludes documenting all of the container images in this advisory. \nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel\nease-notes.html\n\nThis update fixes the following bug among others:\n\n* Previously, resources for the ClusterOperator were being created early in\nthe update process, which led to update failures when the ClusterOperator\nhad no status condition while Operators were updating. This bug fix changes\nthe timing of when these resources are created. As a result, updates can\ntake place without errors. (BZ#1959238)\n\nSecurity Fix(es):\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index\nvalidation (CVE-2021-3121)\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n(For x86_64 architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.13-x86_64\n\nThe image digest is\nsha256:783a2c963f35ccab38e82e6a8c7fa954c3a4551e07d2f43c06098828dd986ed4\n\n(For s390x architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.13-s390x\n\nThe image digest is\nsha256:4cf44e68413acad063203e1ee8982fd01d8b9c1f8643a5b31cd7ff341b3199cd\n\n(For ppc64le architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.13-ppc64le\n\nThe image digest is\nsha256:d47ce972f87f14f1f3c5d50428d2255d1256dae3f45c938ace88547478643e36\n\nAll OpenShift Container Platform 4.7 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n- -between-minor.html#understanding-upgrade-channels_updating-cluster-between\n- -minor\n\n3. Solution:\n\nFor OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel\nease-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n- -cli.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation\n1923268 - [Assisted-4.7] [Staging] Using two both spelling \"canceled\" \"cancelled\"\n1947216 - [AWS] Missing iam:ListAttachedRolePolicies permission in permissions.go\n1953963 - Enable/Disable host operations returns cluster resource with incomplete hosts list\n1957749 - ovn-kubernetes pod should have CPU and memory requests set but not limits\n1959238 - CVO creating cloud-controller-manager too early causing upgrade failures\n1960103 - SR-IOV obliviously reboot the node\n1961941 - Local Storage Operator using LocalVolume CR fails to create PV\u0027s when backend storage failure is simulated\n1962302 - packageserver clusteroperator does not set reason or message for Available condition\n1962312 - Deployment considered unhealthy despite being available and at latest generation\n1962435 - Public DNS records were not deleted when destroying a cluster which is using byo private hosted zone\n1963115 - Test verify /run filesystem contents failing\n\n5. Summary:\n\nRelease of components for the Service Telemetry Framework\n\n2. Description:\n\nService Telemetry Framework (STF) provides automated collection of\nmeasurements and data from remote clients, such as Red Hat OpenStack\nPlatform or third-party nodes. \n\nBug fixes:\n\n* STF 1.3.3 now supports OpenShift Container Platform 4.8 as an\ninstallation platform. (BZ#2013268)\n\n* With this update, the servicetelemetrys.infra.watch CRD has a validation\nthat limits the clouds[].name to 10 characters and alphanumeric to avoid\nissues with extra characters in the cloud name and names being too long. \n(BZ#2011603)\n\n* Previously, when you installed STF without having Elastic Cloud on\nKubernetes (ECK) Operator installed, the following error message was\nreturned: \"Failed to find exact match for\nelasticsearch.k8s.elastic.co/v1beta1.Elasticsearch\". The error was as a\nresult of Service Telemetry Operator trying to look up information from a\nnon-existent API interface. \n\nWith this update, the Service Telemetry Operator verifies that the API\nexists before it attempts to make requests to the API interface that is\nprovided by ECK. (BZ#1959166)\n\n3. \nDockerfiles and scripts should be amended either to refer to this new image\nspecifically, or to the latest image generally. Bugs fixed (https://bugzilla.redhat.com/):\n\n1959166 - Service Telemetry Operator can error out if ElasticSearch (ECK) CRD is not installed\n1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic\n2011603 - STF multi-cloud setup misinterprets name if a \"-\" is being used\n2013268 - [RFE] Support STF 1.3 on OCP 4.8\n\n5", "sources": [ { "db": "NVD", "id": "CVE-2019-3842" }, { "db": "JVNDB", "id": "JVNDB-2019-003372" }, { "db": "CNVD", "id": "CNVD-2019-14937" }, { "db": "VULMON", "id": "CVE-2019-3842" }, { "db": "PACKETSTORM", "id": "162837" }, { "db": "PACKETSTORM", "id": "163209" }, { "db": "PACKETSTORM", "id": "163257" }, { "db": "PACKETSTORM", "id": "163276" }, { "db": "PACKETSTORM", "id": "163188" }, { "db": "PACKETSTORM", "id": "163496" }, { "db": "PACKETSTORM", "id": "162877" }, { "db": "PACKETSTORM", "id": "164901" } ], "trust": 2.97 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=46743", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-3842" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-3842", "trust": 3.9 }, { "db": "PACKETSTORM", "id": "152610", "trust": 2.5 }, { "db": "EXPLOIT-DB", "id": "46743", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2019-003372", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "162837", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "163276", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "163496", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "162877", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "164901", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-14937", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1820", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2180", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2365", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1866", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1687", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.4058", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2228", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3471", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.1219", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.1185", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3848", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "162627", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "163267", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "164553", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "152445", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021062315", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021062703", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021102006", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021052027", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021092220", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021071516", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201904-418", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2019-3842", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163209", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163257", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163188", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-14937" }, { "db": "VULMON", "id": "CVE-2019-3842" }, { "db": "JVNDB", "id": "JVNDB-2019-003372" }, { "db": "PACKETSTORM", "id": "162837" }, { "db": "PACKETSTORM", "id": "163209" }, { "db": "PACKETSTORM", "id": "163257" }, { "db": "PACKETSTORM", "id": "163276" }, { "db": "PACKETSTORM", "id": "163188" }, { "db": "PACKETSTORM", "id": "163496" }, { "db": "PACKETSTORM", "id": "162877" }, { "db": "PACKETSTORM", "id": "164901" }, { "db": "CNNVD", "id": "CNNVD-201904-418" }, { "db": "NVD", "id": "CVE-2019-3842" } ] }, "id": "VAR-201904-0347", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-14937" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-14937" } ] }, "last_update_date": "2024-07-23T20:01:54.618000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "[SECURITY] [DLA 1762-1] systemd security update", "trust": 0.8, "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html" }, { "title": "FEDORA-2019-3fa5db9e19", "trust": 0.8, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/str36rje4zziormdxrervbhmprnrthac/" }, { "title": "Top Page", "trust": 0.8, "url": "https://www.freedesktop.org/wiki/software/systemd/" }, { "title": "Bug 1668521", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2019-3842" }, { "title": "Patch for systemd permission and access control issue vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/161823" }, { "title": "systemd Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=91247" }, { "title": "Ubuntu Security Notice: systemd vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-3938-1" }, { "title": "Debian Security Advisories: DSA-4428-1 systemd -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=5c365eb29a9f32b7a81ec971ccdd9c30" }, { "title": "Amazon Linux 2: ALAS2-2022-1854", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2-2022-1854" }, { "title": "IBM: Security Bulletin: Multiple vulnerabilities affect IBM Cloud Object Storage Systems (February 2020v1)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=979e60202a29c3c55731e37f8ddc5a3b" }, { "title": "IBM: IBM Security Bulletin: Vyatta 5600 vRouter Software Patches \u2013 Releases 1801-w and 1801-y", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=bf3f2299a8658b7cd3984c40e7060666" }, { "title": "", "trust": 0.1, "url": "https://github.com/vincent-deng/veracode-container-security-finding-parser " } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-14937" }, { "db": "VULMON", "id": "CVE-2019-3842" }, { "db": "JVNDB", "id": "JVNDB-2019-003372" }, { "db": "CNNVD", "id": "CNNVD-201904-418" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-863", "trust": 1.0 }, { "problemtype": "CWE-264", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003372" }, { "db": "NVD", "id": "CVE-2019-3842" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.7, "url": "http://packetstormsecurity.com/files/152610/systemd-seat-verification-active-session-spoofing.html" }, { "trust": 2.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3842" }, { "trust": 1.7, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2019-3842" }, { "trust": 1.7, "url": "https://www.exploit-db.com/exploits/46743/" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html" }, { "trust": 1.1, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/str36rje4zziormdxrervbhmprnrthac/" }, { "trust": 1.1, "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3cissues.bookkeeper.apache.org%3e" }, { "trust": 1.1, "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3cissues.bookkeeper.apache.org%3e" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-3842" }, { "trust": 0.8, "url": "https://access.redhat.com/security/cve/cve-2019-3842" }, { "trust": 0.8, "url": "https://access.redhat.com/security/cve/cve-2020-13776" }, { "trust": 0.8, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.8, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.8, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.8, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.7, "url": "https://www.exploit-db.com/exploits/46743" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-8286" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-28196" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-15358" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-13434" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13776" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-24977" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-8231" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-29362" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-8285" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-10228" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2019-9169" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25013" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-29361" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9169" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2021-3326" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2019-25013" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2019-2708" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-8927" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-29363" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-2708" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2016-10228" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-8284" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-27618" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13434" }, { "trust": 0.6, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/str36rje4zziormdxrervbhmprnrthac/" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3cissues.bookkeeper.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3cissues.bookkeeper.apache.org%3e" }, { "trust": 0.6, "url": "http://www.debian.org/security/2019/dsa-4428" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191364-2.html" }, { "trust": 0.6, "url": "http://www.ubuntu.com/usn/usn-3938-1" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/162627/red-hat-security-advisory-2021-1611-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1866" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1820" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1687" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3848" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2365" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2180" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3471" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163276/red-hat-security-advisory-2021-2543-01.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/164553/red-hat-security-advisory-2021-3900-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/78606" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021102006" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021052027" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/152445/debian-security-advisory-4428-1.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163496/red-hat-security-advisory-2021-2705-01.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/164901/red-hat-security-advisory-2021-4582-02.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2228" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021062703" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021092220" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/6520474" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/162837/red-hat-security-advisory-2021-2136-01.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163267/red-hat-security-advisory-2021-2532-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/78770" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021071516" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/162877/red-hat-security-advisory-2021-2121-01.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021062315" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/systemd-privilege-escalation-via-pam-module-policykit-spoofing-28965" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.4058" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2020-26116" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2020-27619" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2021-3177" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2021-23336" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-15358" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-14502" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2017-14502" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2021-20305" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-26137" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27618" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8231" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24977" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28196" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29362" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29363" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29361" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2021-27219" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-13543" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-9951" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-10878" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-9948" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2019-13012" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-13584" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-12362" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-9983" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10543" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12362" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2020-10543" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13012" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10878" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2019-14866" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14866" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-3449" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-3450" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8284" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8285" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8286" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8927" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14347" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36322" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-12114" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-25712" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12114" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-27835" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-25704" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3121" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19528" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0431" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14363" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-18811" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13543" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14360" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13584" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-19528" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-12464" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14314" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14356" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-27786" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-25643" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-24394" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-0431" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-0342" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18811" }, { "trust": 0.2, "url": "https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14345" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14344" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-19523" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14362" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14361" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-25285" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-35508" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-25212" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19523" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-28974" }, { "trust": 0.2, "url": "https://issues.jboss.org/):" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-15437" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-25284" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14346" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11608" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-11608" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12464" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-26116" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36242" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27619" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-27783" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-25659" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27219" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20305" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3326" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3114" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-28362" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25039" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25037" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-25037" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-28935" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-25034" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-25035" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-25038" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25040" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-24330" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25042" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-25042" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25038" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-25032" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-25041" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-25036" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25032" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-25215" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-24331" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25036" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25035" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-24332" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-25039" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-25040" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25041" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-25034" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/863.html" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/3938-1/" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=59981" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14346" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14345" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14347" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14360" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2136" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14314" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14344" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-u" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14356" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2479" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-23240" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3139" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-26137" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-23239" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25659" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36242" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27783" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3528" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25678" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-25678" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-25736" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3450" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2130" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.7/windows_containers/window" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-25736" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3449" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28500" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-28500" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-13949" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28362" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.7/jaeger/jaeger_install/rhb" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2543" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-23336" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13949" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-23337" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-21639" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12364" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-28165" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-28092" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-12363" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24330" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-28163" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-21309" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-21640" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-28918" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3543" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3501" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-25648" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-8648" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-27170" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-25692" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-2433" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3347" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12363" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-12364" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2461" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27918" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2705" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-31525" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-31525" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-27918" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-33196" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-33196" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-15586" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.7/updating/updating-cluster" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-16845" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-21645" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-21643" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-30465" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-21644" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2121" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2122" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-21642" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:4582" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-34558" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22923" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-22922" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3620" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22922" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3620" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-34558" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-22923" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-14937" }, { "db": "VULMON", "id": "CVE-2019-3842" }, { "db": "JVNDB", "id": "JVNDB-2019-003372" }, { "db": "PACKETSTORM", "id": "162837" }, { "db": "PACKETSTORM", "id": "163209" }, { "db": "PACKETSTORM", "id": "163257" }, { "db": "PACKETSTORM", "id": "163276" }, { "db": "PACKETSTORM", "id": "163188" }, { "db": "PACKETSTORM", "id": "163496" }, { "db": "PACKETSTORM", "id": "162877" }, { "db": "PACKETSTORM", "id": "164901" }, { "db": "CNNVD", "id": "CNNVD-201904-418" }, { "db": "NVD", "id": "CVE-2019-3842" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-14937" }, { "db": "VULMON", "id": "CVE-2019-3842" }, { "db": "JVNDB", "id": "JVNDB-2019-003372" }, { "db": "PACKETSTORM", "id": "162837" }, { "db": "PACKETSTORM", "id": "163209" }, { "db": "PACKETSTORM", "id": "163257" }, { "db": "PACKETSTORM", "id": "163276" }, { "db": "PACKETSTORM", "id": "163188" }, { "db": "PACKETSTORM", "id": "163496" }, { "db": "PACKETSTORM", "id": "162877" }, { "db": "PACKETSTORM", "id": "164901" }, { "db": "CNNVD", "id": "CNNVD-201904-418" }, { "db": "NVD", "id": "CVE-2019-3842" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-05-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-14937" }, { "date": "2019-04-09T00:00:00", "db": "VULMON", "id": "CVE-2019-3842" }, { "date": "2019-05-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003372" }, { "date": "2021-05-27T13:28:54", "db": "PACKETSTORM", "id": "162837" }, { "date": "2021-06-17T18:34:10", "db": "PACKETSTORM", "id": "163209" }, { "date": "2021-06-23T15:44:15", "db": "PACKETSTORM", "id": "163257" }, { "date": "2021-06-24T17:54:53", "db": "PACKETSTORM", "id": "163276" }, { "date": "2021-06-17T17:53:22", "db": "PACKETSTORM", "id": "163188" }, { "date": "2021-07-14T15:02:07", "db": "PACKETSTORM", "id": "163496" }, { "date": "2021-06-01T14:45:29", "db": "PACKETSTORM", "id": "162877" }, { "date": "2021-11-10T17:15:07", "db": "PACKETSTORM", "id": "164901" }, { "date": "2019-04-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-418" }, { "date": "2019-04-09T21:29:03.443000", "db": "NVD", "id": "CVE-2019-3842" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-05-21T00:00:00", "db": "CNVD", "id": "CNVD-2019-14937" }, { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2019-3842" }, { "date": "2019-05-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003372" }, { "date": "2022-02-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-418" }, { "date": "2023-11-07T03:10:13.917000", "db": "NVD", "id": "CVE-2019-3842" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-418" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "systemd Vulnerabilities related to authorization, permissions, and access control", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003372" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-418" } ], "trust": 0.6 } }
rhsa-2021_3900
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for systemd is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.\n\nSecurity Fix(es):\n\n* systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\" (CVE-2019-3842)\n\n* systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits (CVE-2020-13776)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:3900", "url": "https://access.redhat.com/errata/RHSA-2021:3900" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1668521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668521" }, { "category": "external", "summary": "1845534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845534" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3900.json" } ], "title": "Red Hat Security Advisory: systemd security update", "tracking": { "current_release_date": "2024-11-22T15:56:28+00:00", "generator": { "date": "2024-11-22T15:56:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:3900", "initial_release_date": "2021-10-19T07:18:34+00:00", "revision_history": [ { "date": "2021-10-19T07:18:34+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-10-19T07:18:34+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T15:56:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "systemd-0:239-31.el8_2.7.src", "product": { "name": "systemd-0:239-31.el8_2.7.src", "product_id": "systemd-0:239-31.el8_2.7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "systemd-0:239-31.el8_2.7.aarch64", "product": { "name": "systemd-0:239-31.el8_2.7.aarch64", "product_id": "systemd-0:239-31.el8_2.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-container-0:239-31.el8_2.7.aarch64", "product": { "name": "systemd-container-0:239-31.el8_2.7.aarch64", "product_id": "systemd-container-0:239-31.el8_2.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-devel-0:239-31.el8_2.7.aarch64", "product": { "name": "systemd-devel-0:239-31.el8_2.7.aarch64", "product_id": "systemd-devel-0:239-31.el8_2.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-journal-remote-0:239-31.el8_2.7.aarch64", "product": { "name": "systemd-journal-remote-0:239-31.el8_2.7.aarch64", "product_id": "systemd-journal-remote-0:239-31.el8_2.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-libs-0:239-31.el8_2.7.aarch64", "product": { "name": "systemd-libs-0:239-31.el8_2.7.aarch64", "product_id": "systemd-libs-0:239-31.el8_2.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-pam-0:239-31.el8_2.7.aarch64", "product": { "name": "systemd-pam-0:239-31.el8_2.7.aarch64", "product_id": "systemd-pam-0:239-31.el8_2.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-tests-0:239-31.el8_2.7.aarch64", "product": { "name": "systemd-tests-0:239-31.el8_2.7.aarch64", "product_id": "systemd-tests-0:239-31.el8_2.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-udev-0:239-31.el8_2.7.aarch64", "product": { "name": "systemd-udev-0:239-31.el8_2.7.aarch64", "product_id": "systemd-udev-0:239-31.el8_2.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-debugsource-0:239-31.el8_2.7.aarch64", "product": { "name": "systemd-debugsource-0:239-31.el8_2.7.aarch64", "product_id": "systemd-debugsource-0:239-31.el8_2.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "product": { "name": "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "product_id": "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-debuginfo-0:239-31.el8_2.7.aarch64", "product": { "name": "systemd-debuginfo-0:239-31.el8_2.7.aarch64", "product_id": "systemd-debuginfo-0:239-31.el8_2.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "product": { "name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "product_id": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "product": { "name": "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "product_id": "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "product": { "name": "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "product_id": "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "product": { "name": "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "product_id": "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "product": { "name": "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "product_id": "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "systemd-0:239-31.el8_2.7.ppc64le", "product": { "name": "systemd-0:239-31.el8_2.7.ppc64le", "product_id": "systemd-0:239-31.el8_2.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-container-0:239-31.el8_2.7.ppc64le", "product": { "name": "systemd-container-0:239-31.el8_2.7.ppc64le", "product_id": "systemd-container-0:239-31.el8_2.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-devel-0:239-31.el8_2.7.ppc64le", "product": { "name": "systemd-devel-0:239-31.el8_2.7.ppc64le", "product_id": "systemd-devel-0:239-31.el8_2.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "product": { "name": "systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "product_id": "systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-libs-0:239-31.el8_2.7.ppc64le", "product": { "name": "systemd-libs-0:239-31.el8_2.7.ppc64le", "product_id": "systemd-libs-0:239-31.el8_2.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-pam-0:239-31.el8_2.7.ppc64le", "product": { "name": "systemd-pam-0:239-31.el8_2.7.ppc64le", "product_id": "systemd-pam-0:239-31.el8_2.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-tests-0:239-31.el8_2.7.ppc64le", "product": { "name": "systemd-tests-0:239-31.el8_2.7.ppc64le", "product_id": "systemd-tests-0:239-31.el8_2.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-udev-0:239-31.el8_2.7.ppc64le", "product": { "name": "systemd-udev-0:239-31.el8_2.7.ppc64le", "product_id": "systemd-udev-0:239-31.el8_2.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-debugsource-0:239-31.el8_2.7.ppc64le", "product": { "name": "systemd-debugsource-0:239-31.el8_2.7.ppc64le", "product_id": "systemd-debugsource-0:239-31.el8_2.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "product": { "name": "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "product_id": "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "product": { "name": "systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "product_id": "systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "product": { "name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "product_id": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "product": { "name": "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "product_id": "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "product": { "name": "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "product_id": "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "product": { "name": "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "product_id": "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "product": { "name": "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "product_id": "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "systemd-0:239-31.el8_2.7.i686", "product": { "name": "systemd-0:239-31.el8_2.7.i686", "product_id": "systemd-0:239-31.el8_2.7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=i686" } } }, { "category": "product_version", "name": "systemd-container-0:239-31.el8_2.7.i686", "product": { "name": "systemd-container-0:239-31.el8_2.7.i686", "product_id": "systemd-container-0:239-31.el8_2.7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=i686" } } }, { "category": "product_version", "name": "systemd-devel-0:239-31.el8_2.7.i686", "product": { "name": "systemd-devel-0:239-31.el8_2.7.i686", "product_id": "systemd-devel-0:239-31.el8_2.7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=i686" } } }, { "category": "product_version", "name": "systemd-libs-0:239-31.el8_2.7.i686", "product": { "name": "systemd-libs-0:239-31.el8_2.7.i686", "product_id": "systemd-libs-0:239-31.el8_2.7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=i686" } } }, { "category": "product_version", "name": "systemd-debugsource-0:239-31.el8_2.7.i686", "product": { "name": "systemd-debugsource-0:239-31.el8_2.7.i686", "product_id": "systemd-debugsource-0:239-31.el8_2.7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=i686" } } }, { "category": "product_version", "name": "systemd-container-debuginfo-0:239-31.el8_2.7.i686", "product": { "name": "systemd-container-debuginfo-0:239-31.el8_2.7.i686", "product_id": "systemd-container-debuginfo-0:239-31.el8_2.7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=i686" } } }, { "category": "product_version", "name": "systemd-debuginfo-0:239-31.el8_2.7.i686", "product": { "name": "systemd-debuginfo-0:239-31.el8_2.7.i686", "product_id": "systemd-debuginfo-0:239-31.el8_2.7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=i686" } } }, { "category": "product_version", "name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "product": { "name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "product_id": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=i686" } } }, { "category": "product_version", "name": "systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "product": { "name": "systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "product_id": "systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=i686" } } }, { "category": "product_version", "name": "systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "product": { "name": "systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "product_id": "systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=i686" } } }, { "category": "product_version", "name": "systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "product": { "name": "systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "product_id": "systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=i686" } } }, { "category": "product_version", "name": "systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "product": { "name": "systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "product_id": "systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "systemd-0:239-31.el8_2.7.x86_64", "product": { "name": "systemd-0:239-31.el8_2.7.x86_64", "product_id": "systemd-0:239-31.el8_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-container-0:239-31.el8_2.7.x86_64", "product": { "name": "systemd-container-0:239-31.el8_2.7.x86_64", "product_id": "systemd-container-0:239-31.el8_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-devel-0:239-31.el8_2.7.x86_64", "product": { "name": "systemd-devel-0:239-31.el8_2.7.x86_64", "product_id": "systemd-devel-0:239-31.el8_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-journal-remote-0:239-31.el8_2.7.x86_64", "product": { "name": "systemd-journal-remote-0:239-31.el8_2.7.x86_64", "product_id": "systemd-journal-remote-0:239-31.el8_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-libs-0:239-31.el8_2.7.x86_64", "product": { "name": "systemd-libs-0:239-31.el8_2.7.x86_64", "product_id": "systemd-libs-0:239-31.el8_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-pam-0:239-31.el8_2.7.x86_64", "product": { "name": "systemd-pam-0:239-31.el8_2.7.x86_64", "product_id": "systemd-pam-0:239-31.el8_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-tests-0:239-31.el8_2.7.x86_64", "product": { "name": "systemd-tests-0:239-31.el8_2.7.x86_64", "product_id": "systemd-tests-0:239-31.el8_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-udev-0:239-31.el8_2.7.x86_64", "product": { "name": "systemd-udev-0:239-31.el8_2.7.x86_64", "product_id": "systemd-udev-0:239-31.el8_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-debugsource-0:239-31.el8_2.7.x86_64", "product": { "name": "systemd-debugsource-0:239-31.el8_2.7.x86_64", "product_id": "systemd-debugsource-0:239-31.el8_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "product": { "name": "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "product_id": "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-debuginfo-0:239-31.el8_2.7.x86_64", "product": { "name": "systemd-debuginfo-0:239-31.el8_2.7.x86_64", "product_id": "systemd-debuginfo-0:239-31.el8_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "product": { "name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "product_id": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "product": { "name": "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "product_id": "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "product": { "name": "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "product_id": "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "product": { "name": "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "product_id": "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", "product": { "name": "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", "product_id": "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "systemd-0:239-31.el8_2.7.s390x", "product": { "name": "systemd-0:239-31.el8_2.7.s390x", "product_id": "systemd-0:239-31.el8_2.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=s390x" } } }, { "category": "product_version", "name": "systemd-container-0:239-31.el8_2.7.s390x", "product": { "name": "systemd-container-0:239-31.el8_2.7.s390x", "product_id": "systemd-container-0:239-31.el8_2.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=s390x" } } }, { "category": "product_version", "name": "systemd-devel-0:239-31.el8_2.7.s390x", "product": { "name": "systemd-devel-0:239-31.el8_2.7.s390x", "product_id": "systemd-devel-0:239-31.el8_2.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=s390x" } } }, { "category": "product_version", "name": "systemd-journal-remote-0:239-31.el8_2.7.s390x", "product": { "name": "systemd-journal-remote-0:239-31.el8_2.7.s390x", "product_id": "systemd-journal-remote-0:239-31.el8_2.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=s390x" } } }, { "category": "product_version", "name": "systemd-libs-0:239-31.el8_2.7.s390x", "product": { "name": "systemd-libs-0:239-31.el8_2.7.s390x", "product_id": "systemd-libs-0:239-31.el8_2.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=s390x" } } }, { "category": "product_version", "name": "systemd-pam-0:239-31.el8_2.7.s390x", "product": { "name": "systemd-pam-0:239-31.el8_2.7.s390x", "product_id": "systemd-pam-0:239-31.el8_2.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=s390x" } } }, { "category": "product_version", "name": "systemd-tests-0:239-31.el8_2.7.s390x", "product": { "name": "systemd-tests-0:239-31.el8_2.7.s390x", "product_id": "systemd-tests-0:239-31.el8_2.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=s390x" } } }, { "category": "product_version", "name": "systemd-udev-0:239-31.el8_2.7.s390x", "product": { "name": "systemd-udev-0:239-31.el8_2.7.s390x", "product_id": "systemd-udev-0:239-31.el8_2.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=s390x" } } }, { "category": "product_version", "name": "systemd-debugsource-0:239-31.el8_2.7.s390x", "product": { "name": "systemd-debugsource-0:239-31.el8_2.7.s390x", "product_id": "systemd-debugsource-0:239-31.el8_2.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=s390x" } } }, { "category": "product_version", "name": "systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "product": { "name": "systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "product_id": "systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=s390x" } } }, { "category": "product_version", "name": "systemd-debuginfo-0:239-31.el8_2.7.s390x", "product": { "name": "systemd-debuginfo-0:239-31.el8_2.7.s390x", "product_id": "systemd-debuginfo-0:239-31.el8_2.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=s390x" } } }, { "category": "product_version", "name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "product": { "name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "product_id": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=s390x" } } }, { "category": "product_version", "name": "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "product": { "name": "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "product_id": "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=s390x" } } }, { "category": "product_version", "name": "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "product": { "name": "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "product_id": "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=s390x" } } }, { "category": "product_version", "name": "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "product": { "name": "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "product_id": "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=s390x" } } }, { "category": "product_version", "name": "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "product": { "name": "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "product_id": "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "systemd-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64" }, "product_reference": "systemd-0:239-31.el8_2.7.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686" }, "product_reference": "systemd-0:239-31.el8_2.7.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le" }, "product_reference": "systemd-0:239-31.el8_2.7.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x" }, "product_reference": "systemd-0:239-31.el8_2.7.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-0:239-31.el8_2.7.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src" }, "product_reference": "systemd-0:239-31.el8_2.7.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64" }, "product_reference": "systemd-0:239-31.el8_2.7.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64" }, "product_reference": "systemd-container-0:239-31.el8_2.7.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686" }, "product_reference": "systemd-container-0:239-31.el8_2.7.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le" }, "product_reference": "systemd-container-0:239-31.el8_2.7.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x" }, "product_reference": "systemd-container-0:239-31.el8_2.7.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64" }, "product_reference": "systemd-container-0:239-31.el8_2.7.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64" }, "product_reference": "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686" }, "product_reference": "systemd-container-debuginfo-0:239-31.el8_2.7.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le" }, "product_reference": "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x" }, "product_reference": "systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64" }, "product_reference": "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64" }, "product_reference": "systemd-debuginfo-0:239-31.el8_2.7.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686" }, "product_reference": "systemd-debuginfo-0:239-31.el8_2.7.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le" }, "product_reference": "systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x" }, "product_reference": "systemd-debuginfo-0:239-31.el8_2.7.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64" }, "product_reference": "systemd-debuginfo-0:239-31.el8_2.7.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debugsource-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64" }, "product_reference": "systemd-debugsource-0:239-31.el8_2.7.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debugsource-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686" }, "product_reference": "systemd-debugsource-0:239-31.el8_2.7.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debugsource-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le" }, "product_reference": "systemd-debugsource-0:239-31.el8_2.7.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debugsource-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x" }, "product_reference": "systemd-debugsource-0:239-31.el8_2.7.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debugsource-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64" }, "product_reference": "systemd-debugsource-0:239-31.el8_2.7.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-devel-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64" }, "product_reference": "systemd-devel-0:239-31.el8_2.7.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-devel-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686" }, "product_reference": "systemd-devel-0:239-31.el8_2.7.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-devel-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le" }, "product_reference": "systemd-devel-0:239-31.el8_2.7.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-devel-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x" }, "product_reference": "systemd-devel-0:239-31.el8_2.7.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-devel-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64" }, "product_reference": "systemd-devel-0:239-31.el8_2.7.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-journal-remote-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64" }, "product_reference": "systemd-journal-remote-0:239-31.el8_2.7.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-journal-remote-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le" }, "product_reference": "systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-journal-remote-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x" }, "product_reference": "systemd-journal-remote-0:239-31.el8_2.7.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-journal-remote-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64" }, "product_reference": "systemd-journal-remote-0:239-31.el8_2.7.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64" }, "product_reference": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686" }, "product_reference": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le" }, "product_reference": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x" }, "product_reference": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64" }, "product_reference": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64" }, "product_reference": "systemd-libs-0:239-31.el8_2.7.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686" }, "product_reference": "systemd-libs-0:239-31.el8_2.7.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le" }, "product_reference": "systemd-libs-0:239-31.el8_2.7.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x" }, "product_reference": "systemd-libs-0:239-31.el8_2.7.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64" }, "product_reference": "systemd-libs-0:239-31.el8_2.7.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64" }, "product_reference": "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686" }, "product_reference": "systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le" }, "product_reference": "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x" }, "product_reference": "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64" }, "product_reference": "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-pam-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64" }, "product_reference": "systemd-pam-0:239-31.el8_2.7.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-pam-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le" }, "product_reference": "systemd-pam-0:239-31.el8_2.7.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-pam-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x" }, "product_reference": "systemd-pam-0:239-31.el8_2.7.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-pam-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64" }, "product_reference": "systemd-pam-0:239-31.el8_2.7.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64" }, "product_reference": "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-pam-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686" }, "product_reference": "systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le" }, "product_reference": "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x" }, "product_reference": "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64" }, "product_reference": "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-tests-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64" }, "product_reference": "systemd-tests-0:239-31.el8_2.7.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-tests-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le" }, "product_reference": "systemd-tests-0:239-31.el8_2.7.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-tests-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x" }, "product_reference": "systemd-tests-0:239-31.el8_2.7.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-tests-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64" }, "product_reference": "systemd-tests-0:239-31.el8_2.7.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64" }, "product_reference": "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-tests-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686" }, "product_reference": "systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le" }, "product_reference": "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x" }, "product_reference": "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64" }, "product_reference": "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-udev-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64" }, "product_reference": "systemd-udev-0:239-31.el8_2.7.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-udev-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le" }, "product_reference": "systemd-udev-0:239-31.el8_2.7.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-udev-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x" }, "product_reference": "systemd-udev-0:239-31.el8_2.7.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-udev-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64" }, "product_reference": "systemd-udev-0:239-31.el8_2.7.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64" }, "product_reference": "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-udev-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686" }, "product_reference": "systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le" }, "product_reference": "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x" }, "product_reference": "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", "product_id": "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64" }, "product_reference": "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jann Horn" ], "organization": "Google Project Zero" } ], "cve": "CVE-2019-3842", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2019-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1668521" } ], "notes": [ { "category": "description", "text": "It was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", "title": "Vulnerability description" }, { "category": "summary", "text": "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\"", "title": "Vulnerability summary" }, { "category": "other", "text": "For the attack to be successful, a new session must be created by pam_systemd. This is done only if the calling process is not already part of a session. Red Hat Enterprise Linux, in its default PAM configurations, does not let a session sneak in without systemd knowing about it, since pam_systemd is always called in every PAM config file. Unless a wrong PAM config file is in place, this vulnerability cannot be triggered on Red Hat Enterprise Linux 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3842" }, { "category": "external", "summary": "RHBZ#1668521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3842", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3842" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3842", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3842" } ], "release_date": "2019-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-10-19T07:18:34+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:3900" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\"" }, { "cve": "CVE-2020-13776", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845534" } ], "notes": [ { "category": "description", "text": "A flaw was found in systemd, where it mishandles numerical usernames beginning with decimal digits, or \"0x\" followed by hexadecimal digits. When the usernames are used by systemd, for example in service units, an unexpected user may be used instead. In some particular configurations, this flaw allows local attackers to elevate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits", "title": "Vulnerability summary" }, { "category": "other", "text": "The flaw is rated as Moderate because several uncommon conditions have to be met to make it exploitable. Numerical usernames with decimal digits or starting with \"0x\" followed by hexadecimal digits must exist on the system. Systemd would need to process those particular usernames (e.g. while using the `User=` directive in a systemd service unit). If the service was supposed to run as a regular user and the binary being executed can be controlled by a local attacker, he could abuse this flaw to unexpectedly execute code as a root when the service is started. If the service was run as a regular user to limit the impact of a possible flaw in the service, this flaw would not provide the intended additional protection.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13776" }, { "category": "external", "summary": "RHBZ#1845534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845534" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13776", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13776" } ], "release_date": "2020-05-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-10-19T07:18:34+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:3900" }, { "category": "workaround", "details": "Do not use `User=` directive in services with numerical usernames composed by decimal digits or starting with \"0x\" followed by hexadecimal digits (e.g. 0x[0-9A-Fa-f]+).", "product_ids": [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits" } ] }
rhsa-2021_1611
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for systemd is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.\n\nSecurity Fix(es):\n\n* systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\" (CVE-2019-3842)\n\n* systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits (CVE-2020-13776)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:1611", "url": "https://access.redhat.com/errata/RHSA-2021:1611" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/" }, { "category": "external", "summary": "1668521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668521" }, { "category": "external", "summary": "1740657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740657" }, { "category": "external", "summary": "1755287", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755287" }, { "category": "external", "summary": "1764282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764282" }, { "category": "external", "summary": "1812972", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1812972" }, { "category": "external", "summary": "1819868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819868" }, { "category": "external", "summary": "1845534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845534" }, { "category": "external", "summary": "1862714", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1862714" }, { "category": "external", "summary": "1865840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865840" }, { "category": "external", "summary": "1868831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868831" }, { "category": "external", "summary": "1868877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868877" }, { "category": "external", "summary": "1870638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870638" }, { "category": "external", "summary": "1871139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1871139" }, { "category": "external", "summary": "1880270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880270" }, { "category": "external", "summary": "1885553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885553" }, { "category": "external", "summary": "1887181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887181" }, { "category": "external", "summary": "1888912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888912" }, { "category": "external", "summary": "1889996", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889996" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1611.json" } ], "title": "Red Hat Security Advisory: systemd security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T15:56:20+00:00", "generator": { "date": "2024-11-22T15:56:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:1611", "initial_release_date": "2021-05-18T15:28:44+00:00", "revision_history": [ { "date": "2021-05-18T15:28:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-05-18T15:28:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T15:56:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "systemd-0:239-45.el8.src", "product": { "name": "systemd-0:239-45.el8.src", "product_id": "systemd-0:239-45.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd@239-45.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "systemd-0:239-45.el8.aarch64", "product": { "name": "systemd-0:239-45.el8.aarch64", "product_id": "systemd-0:239-45.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd@239-45.el8?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-container-0:239-45.el8.aarch64", "product": { "name": "systemd-container-0:239-45.el8.aarch64", "product_id": "systemd-container-0:239-45.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container@239-45.el8?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-devel-0:239-45.el8.aarch64", "product": { "name": "systemd-devel-0:239-45.el8.aarch64", "product_id": "systemd-devel-0:239-45.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-journal-remote-0:239-45.el8.aarch64", "product": { "name": "systemd-journal-remote-0:239-45.el8.aarch64", "product_id": "systemd-journal-remote-0:239-45.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-libs-0:239-45.el8.aarch64", "product": { "name": "systemd-libs-0:239-45.el8.aarch64", "product_id": "systemd-libs-0:239-45.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-pam-0:239-45.el8.aarch64", "product": { "name": "systemd-pam-0:239-45.el8.aarch64", "product_id": "systemd-pam-0:239-45.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-tests-0:239-45.el8.aarch64", "product": { "name": "systemd-tests-0:239-45.el8.aarch64", "product_id": "systemd-tests-0:239-45.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-udev-0:239-45.el8.aarch64", "product": { "name": "systemd-udev-0:239-45.el8.aarch64", "product_id": "systemd-udev-0:239-45.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-debugsource-0:239-45.el8.aarch64", "product": { "name": "systemd-debugsource-0:239-45.el8.aarch64", "product_id": "systemd-debugsource-0:239-45.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-container-debuginfo-0:239-45.el8.aarch64", "product": { "name": "systemd-container-debuginfo-0:239-45.el8.aarch64", "product_id": "systemd-container-debuginfo-0:239-45.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-debuginfo-0:239-45.el8.aarch64", "product": { "name": "systemd-debuginfo-0:239-45.el8.aarch64", "product_id": "systemd-debuginfo-0:239-45.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "product": { "name": "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "product_id": "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-libs-debuginfo-0:239-45.el8.aarch64", "product": { "name": "systemd-libs-debuginfo-0:239-45.el8.aarch64", "product_id": "systemd-libs-debuginfo-0:239-45.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-pam-debuginfo-0:239-45.el8.aarch64", "product": { "name": "systemd-pam-debuginfo-0:239-45.el8.aarch64", "product_id": "systemd-pam-debuginfo-0:239-45.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-tests-debuginfo-0:239-45.el8.aarch64", "product": { "name": "systemd-tests-debuginfo-0:239-45.el8.aarch64", "product_id": "systemd-tests-debuginfo-0:239-45.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=aarch64" } } }, { "category": "product_version", "name": "systemd-udev-debuginfo-0:239-45.el8.aarch64", "product": { "name": "systemd-udev-debuginfo-0:239-45.el8.aarch64", "product_id": "systemd-udev-debuginfo-0:239-45.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "systemd-0:239-45.el8.ppc64le", "product": { "name": "systemd-0:239-45.el8.ppc64le", "product_id": "systemd-0:239-45.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd@239-45.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-container-0:239-45.el8.ppc64le", "product": { "name": "systemd-container-0:239-45.el8.ppc64le", "product_id": "systemd-container-0:239-45.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container@239-45.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-devel-0:239-45.el8.ppc64le", "product": { "name": "systemd-devel-0:239-45.el8.ppc64le", "product_id": "systemd-devel-0:239-45.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-journal-remote-0:239-45.el8.ppc64le", "product": { "name": "systemd-journal-remote-0:239-45.el8.ppc64le", "product_id": "systemd-journal-remote-0:239-45.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-libs-0:239-45.el8.ppc64le", "product": { "name": "systemd-libs-0:239-45.el8.ppc64le", "product_id": "systemd-libs-0:239-45.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-pam-0:239-45.el8.ppc64le", "product": { "name": "systemd-pam-0:239-45.el8.ppc64le", "product_id": "systemd-pam-0:239-45.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-tests-0:239-45.el8.ppc64le", "product": { "name": "systemd-tests-0:239-45.el8.ppc64le", "product_id": "systemd-tests-0:239-45.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-udev-0:239-45.el8.ppc64le", "product": { "name": "systemd-udev-0:239-45.el8.ppc64le", "product_id": "systemd-udev-0:239-45.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-debugsource-0:239-45.el8.ppc64le", "product": { "name": "systemd-debugsource-0:239-45.el8.ppc64le", "product_id": "systemd-debugsource-0:239-45.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-container-debuginfo-0:239-45.el8.ppc64le", "product": { "name": "systemd-container-debuginfo-0:239-45.el8.ppc64le", "product_id": "systemd-container-debuginfo-0:239-45.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-debuginfo-0:239-45.el8.ppc64le", "product": { "name": "systemd-debuginfo-0:239-45.el8.ppc64le", "product_id": "systemd-debuginfo-0:239-45.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "product": { "name": "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "product_id": "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-libs-debuginfo-0:239-45.el8.ppc64le", "product": { "name": "systemd-libs-debuginfo-0:239-45.el8.ppc64le", "product_id": "systemd-libs-debuginfo-0:239-45.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-pam-debuginfo-0:239-45.el8.ppc64le", "product": { "name": "systemd-pam-debuginfo-0:239-45.el8.ppc64le", "product_id": "systemd-pam-debuginfo-0:239-45.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-tests-debuginfo-0:239-45.el8.ppc64le", "product": { "name": "systemd-tests-debuginfo-0:239-45.el8.ppc64le", "product_id": "systemd-tests-debuginfo-0:239-45.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "systemd-udev-debuginfo-0:239-45.el8.ppc64le", "product": { "name": "systemd-udev-debuginfo-0:239-45.el8.ppc64le", "product_id": "systemd-udev-debuginfo-0:239-45.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "systemd-0:239-45.el8.i686", "product": { "name": "systemd-0:239-45.el8.i686", "product_id": "systemd-0:239-45.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd@239-45.el8?arch=i686" } } }, { "category": "product_version", "name": "systemd-container-0:239-45.el8.i686", "product": { "name": "systemd-container-0:239-45.el8.i686", "product_id": "systemd-container-0:239-45.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container@239-45.el8?arch=i686" } } }, { "category": "product_version", "name": "systemd-devel-0:239-45.el8.i686", "product": { "name": "systemd-devel-0:239-45.el8.i686", "product_id": "systemd-devel-0:239-45.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=i686" } } }, { "category": "product_version", "name": "systemd-libs-0:239-45.el8.i686", "product": { "name": "systemd-libs-0:239-45.el8.i686", "product_id": "systemd-libs-0:239-45.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=i686" } } }, { "category": "product_version", "name": "systemd-debugsource-0:239-45.el8.i686", "product": { "name": "systemd-debugsource-0:239-45.el8.i686", "product_id": "systemd-debugsource-0:239-45.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=i686" } } }, { "category": "product_version", "name": "systemd-container-debuginfo-0:239-45.el8.i686", "product": { "name": "systemd-container-debuginfo-0:239-45.el8.i686", "product_id": "systemd-container-debuginfo-0:239-45.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=i686" } } }, { "category": "product_version", "name": "systemd-debuginfo-0:239-45.el8.i686", "product": { "name": "systemd-debuginfo-0:239-45.el8.i686", "product_id": "systemd-debuginfo-0:239-45.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=i686" } } }, { "category": "product_version", "name": "systemd-journal-remote-debuginfo-0:239-45.el8.i686", "product": { "name": "systemd-journal-remote-debuginfo-0:239-45.el8.i686", "product_id": "systemd-journal-remote-debuginfo-0:239-45.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=i686" } } }, { "category": "product_version", "name": "systemd-libs-debuginfo-0:239-45.el8.i686", "product": { "name": "systemd-libs-debuginfo-0:239-45.el8.i686", "product_id": "systemd-libs-debuginfo-0:239-45.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=i686" } } }, { "category": "product_version", "name": "systemd-pam-debuginfo-0:239-45.el8.i686", "product": { "name": "systemd-pam-debuginfo-0:239-45.el8.i686", "product_id": "systemd-pam-debuginfo-0:239-45.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=i686" } } }, { "category": "product_version", "name": "systemd-tests-debuginfo-0:239-45.el8.i686", "product": { "name": "systemd-tests-debuginfo-0:239-45.el8.i686", "product_id": "systemd-tests-debuginfo-0:239-45.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=i686" } } }, { "category": "product_version", "name": "systemd-udev-debuginfo-0:239-45.el8.i686", "product": { "name": "systemd-udev-debuginfo-0:239-45.el8.i686", "product_id": "systemd-udev-debuginfo-0:239-45.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "systemd-0:239-45.el8.x86_64", "product": { "name": "systemd-0:239-45.el8.x86_64", "product_id": "systemd-0:239-45.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd@239-45.el8?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-container-0:239-45.el8.x86_64", "product": { "name": "systemd-container-0:239-45.el8.x86_64", "product_id": "systemd-container-0:239-45.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container@239-45.el8?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-devel-0:239-45.el8.x86_64", "product": { "name": "systemd-devel-0:239-45.el8.x86_64", "product_id": "systemd-devel-0:239-45.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-journal-remote-0:239-45.el8.x86_64", "product": { "name": "systemd-journal-remote-0:239-45.el8.x86_64", "product_id": "systemd-journal-remote-0:239-45.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-libs-0:239-45.el8.x86_64", "product": { "name": "systemd-libs-0:239-45.el8.x86_64", "product_id": "systemd-libs-0:239-45.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-pam-0:239-45.el8.x86_64", "product": { "name": "systemd-pam-0:239-45.el8.x86_64", "product_id": "systemd-pam-0:239-45.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-tests-0:239-45.el8.x86_64", "product": { "name": "systemd-tests-0:239-45.el8.x86_64", "product_id": "systemd-tests-0:239-45.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-udev-0:239-45.el8.x86_64", "product": { "name": "systemd-udev-0:239-45.el8.x86_64", "product_id": "systemd-udev-0:239-45.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-debugsource-0:239-45.el8.x86_64", "product": { "name": "systemd-debugsource-0:239-45.el8.x86_64", "product_id": "systemd-debugsource-0:239-45.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-container-debuginfo-0:239-45.el8.x86_64", "product": { "name": "systemd-container-debuginfo-0:239-45.el8.x86_64", "product_id": "systemd-container-debuginfo-0:239-45.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-debuginfo-0:239-45.el8.x86_64", "product": { "name": "systemd-debuginfo-0:239-45.el8.x86_64", "product_id": "systemd-debuginfo-0:239-45.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "product": { "name": "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "product_id": "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-libs-debuginfo-0:239-45.el8.x86_64", "product": { "name": "systemd-libs-debuginfo-0:239-45.el8.x86_64", "product_id": "systemd-libs-debuginfo-0:239-45.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-pam-debuginfo-0:239-45.el8.x86_64", "product": { "name": "systemd-pam-debuginfo-0:239-45.el8.x86_64", "product_id": "systemd-pam-debuginfo-0:239-45.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-tests-debuginfo-0:239-45.el8.x86_64", "product": { "name": "systemd-tests-debuginfo-0:239-45.el8.x86_64", "product_id": "systemd-tests-debuginfo-0:239-45.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=x86_64" } } }, { "category": "product_version", "name": "systemd-udev-debuginfo-0:239-45.el8.x86_64", "product": { "name": "systemd-udev-debuginfo-0:239-45.el8.x86_64", "product_id": "systemd-udev-debuginfo-0:239-45.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "systemd-0:239-45.el8.s390x", "product": { "name": "systemd-0:239-45.el8.s390x", "product_id": "systemd-0:239-45.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd@239-45.el8?arch=s390x" } } }, { "category": "product_version", "name": "systemd-container-0:239-45.el8.s390x", "product": { "name": "systemd-container-0:239-45.el8.s390x", "product_id": "systemd-container-0:239-45.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container@239-45.el8?arch=s390x" } } }, { "category": "product_version", "name": "systemd-devel-0:239-45.el8.s390x", "product": { "name": "systemd-devel-0:239-45.el8.s390x", "product_id": "systemd-devel-0:239-45.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=s390x" } } }, { "category": "product_version", "name": "systemd-journal-remote-0:239-45.el8.s390x", "product": { "name": "systemd-journal-remote-0:239-45.el8.s390x", "product_id": "systemd-journal-remote-0:239-45.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=s390x" } } }, { "category": "product_version", "name": "systemd-libs-0:239-45.el8.s390x", "product": { "name": "systemd-libs-0:239-45.el8.s390x", "product_id": "systemd-libs-0:239-45.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=s390x" } } }, { "category": "product_version", "name": "systemd-pam-0:239-45.el8.s390x", "product": { "name": "systemd-pam-0:239-45.el8.s390x", "product_id": "systemd-pam-0:239-45.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=s390x" } } }, { "category": "product_version", "name": "systemd-tests-0:239-45.el8.s390x", "product": { "name": "systemd-tests-0:239-45.el8.s390x", "product_id": "systemd-tests-0:239-45.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=s390x" } } }, { "category": "product_version", "name": "systemd-udev-0:239-45.el8.s390x", "product": { "name": "systemd-udev-0:239-45.el8.s390x", "product_id": "systemd-udev-0:239-45.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=s390x" } } }, { "category": "product_version", "name": "systemd-debugsource-0:239-45.el8.s390x", "product": { "name": "systemd-debugsource-0:239-45.el8.s390x", "product_id": "systemd-debugsource-0:239-45.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=s390x" } } }, { "category": "product_version", "name": "systemd-container-debuginfo-0:239-45.el8.s390x", "product": { "name": "systemd-container-debuginfo-0:239-45.el8.s390x", "product_id": "systemd-container-debuginfo-0:239-45.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=s390x" } } }, { "category": "product_version", "name": "systemd-debuginfo-0:239-45.el8.s390x", "product": { "name": "systemd-debuginfo-0:239-45.el8.s390x", "product_id": "systemd-debuginfo-0:239-45.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=s390x" } } }, { "category": "product_version", "name": "systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "product": { "name": "systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "product_id": "systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=s390x" } } }, { "category": "product_version", "name": "systemd-libs-debuginfo-0:239-45.el8.s390x", "product": { "name": "systemd-libs-debuginfo-0:239-45.el8.s390x", "product_id": "systemd-libs-debuginfo-0:239-45.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=s390x" } } }, { "category": "product_version", "name": "systemd-pam-debuginfo-0:239-45.el8.s390x", "product": { "name": "systemd-pam-debuginfo-0:239-45.el8.s390x", "product_id": "systemd-pam-debuginfo-0:239-45.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=s390x" } } }, { "category": "product_version", "name": "systemd-tests-debuginfo-0:239-45.el8.s390x", "product": { "name": "systemd-tests-debuginfo-0:239-45.el8.s390x", "product_id": "systemd-tests-debuginfo-0:239-45.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=s390x" } } }, { "category": "product_version", "name": "systemd-udev-debuginfo-0:239-45.el8.s390x", "product": { "name": "systemd-udev-debuginfo-0:239-45.el8.s390x", "product_id": "systemd-udev-debuginfo-0:239-45.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "systemd-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64" }, "product_reference": "systemd-0:239-45.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686" }, "product_reference": "systemd-0:239-45.el8.i686", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le" }, "product_reference": "systemd-0:239-45.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x" }, "product_reference": "systemd-0:239-45.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-0:239-45.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src" }, "product_reference": "systemd-0:239-45.el8.src", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64" }, "product_reference": "systemd-0:239-45.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64" }, "product_reference": "systemd-container-0:239-45.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686" }, "product_reference": "systemd-container-0:239-45.el8.i686", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le" }, "product_reference": "systemd-container-0:239-45.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x" }, "product_reference": "systemd-container-0:239-45.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64" }, "product_reference": "systemd-container-0:239-45.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64" }, "product_reference": "systemd-container-debuginfo-0:239-45.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686" }, "product_reference": "systemd-container-debuginfo-0:239-45.el8.i686", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le" }, "product_reference": "systemd-container-debuginfo-0:239-45.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x" }, "product_reference": "systemd-container-debuginfo-0:239-45.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-container-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64" }, "product_reference": "systemd-container-debuginfo-0:239-45.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64" }, "product_reference": "systemd-debuginfo-0:239-45.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686" }, "product_reference": "systemd-debuginfo-0:239-45.el8.i686", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le" }, "product_reference": "systemd-debuginfo-0:239-45.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x" }, "product_reference": "systemd-debuginfo-0:239-45.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64" }, "product_reference": "systemd-debuginfo-0:239-45.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debugsource-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64" }, "product_reference": "systemd-debugsource-0:239-45.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debugsource-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686" }, "product_reference": "systemd-debugsource-0:239-45.el8.i686", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debugsource-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le" }, "product_reference": "systemd-debugsource-0:239-45.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debugsource-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x" }, "product_reference": "systemd-debugsource-0:239-45.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-debugsource-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64" }, "product_reference": "systemd-debugsource-0:239-45.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-devel-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64" }, "product_reference": "systemd-devel-0:239-45.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-devel-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686" }, "product_reference": "systemd-devel-0:239-45.el8.i686", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-devel-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le" }, "product_reference": "systemd-devel-0:239-45.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-devel-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x" }, "product_reference": "systemd-devel-0:239-45.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-devel-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64" }, "product_reference": "systemd-devel-0:239-45.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-journal-remote-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64" }, "product_reference": "systemd-journal-remote-0:239-45.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-journal-remote-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le" }, "product_reference": "systemd-journal-remote-0:239-45.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-journal-remote-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x" }, "product_reference": "systemd-journal-remote-0:239-45.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-journal-remote-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64" }, "product_reference": "systemd-journal-remote-0:239-45.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64" }, "product_reference": "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-journal-remote-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686" }, "product_reference": "systemd-journal-remote-debuginfo-0:239-45.el8.i686", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le" }, "product_reference": "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-journal-remote-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x" }, "product_reference": "systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64" }, "product_reference": "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64" }, "product_reference": "systemd-libs-0:239-45.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686" }, "product_reference": "systemd-libs-0:239-45.el8.i686", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le" }, "product_reference": "systemd-libs-0:239-45.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x" }, "product_reference": "systemd-libs-0:239-45.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64" }, "product_reference": "systemd-libs-0:239-45.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64" }, "product_reference": "systemd-libs-debuginfo-0:239-45.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686" }, "product_reference": "systemd-libs-debuginfo-0:239-45.el8.i686", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le" }, "product_reference": "systemd-libs-debuginfo-0:239-45.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x" }, "product_reference": "systemd-libs-debuginfo-0:239-45.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-libs-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64" }, "product_reference": "systemd-libs-debuginfo-0:239-45.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-pam-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64" }, "product_reference": "systemd-pam-0:239-45.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-pam-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le" }, "product_reference": "systemd-pam-0:239-45.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-pam-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x" }, "product_reference": "systemd-pam-0:239-45.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-pam-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64" }, "product_reference": "systemd-pam-0:239-45.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-pam-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64" }, "product_reference": "systemd-pam-debuginfo-0:239-45.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-pam-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686" }, "product_reference": "systemd-pam-debuginfo-0:239-45.el8.i686", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-pam-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le" }, "product_reference": "systemd-pam-debuginfo-0:239-45.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-pam-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x" }, "product_reference": "systemd-pam-debuginfo-0:239-45.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-pam-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64" }, "product_reference": "systemd-pam-debuginfo-0:239-45.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-tests-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64" }, "product_reference": "systemd-tests-0:239-45.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-tests-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le" }, "product_reference": "systemd-tests-0:239-45.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-tests-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x" }, "product_reference": "systemd-tests-0:239-45.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-tests-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64" }, "product_reference": "systemd-tests-0:239-45.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-tests-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64" }, "product_reference": "systemd-tests-debuginfo-0:239-45.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-tests-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686" }, "product_reference": "systemd-tests-debuginfo-0:239-45.el8.i686", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-tests-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le" }, "product_reference": "systemd-tests-debuginfo-0:239-45.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-tests-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x" }, "product_reference": "systemd-tests-debuginfo-0:239-45.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-tests-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64" }, "product_reference": "systemd-tests-debuginfo-0:239-45.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-udev-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64" }, "product_reference": "systemd-udev-0:239-45.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-udev-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le" }, "product_reference": "systemd-udev-0:239-45.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-udev-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x" }, "product_reference": "systemd-udev-0:239-45.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-udev-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64" }, "product_reference": "systemd-udev-0:239-45.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-udev-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64" }, "product_reference": "systemd-udev-debuginfo-0:239-45.el8.aarch64", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-udev-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686" }, "product_reference": "systemd-udev-debuginfo-0:239-45.el8.i686", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-udev-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le" }, "product_reference": "systemd-udev-debuginfo-0:239-45.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-udev-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x" }, "product_reference": "systemd-udev-debuginfo-0:239-45.el8.s390x", "relates_to_product_reference": "BaseOS-8.4.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "systemd-udev-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64" }, "product_reference": "systemd-udev-debuginfo-0:239-45.el8.x86_64", "relates_to_product_reference": "BaseOS-8.4.0.GA" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Jann Horn" ], "organization": "Google Project Zero" } ], "cve": "CVE-2019-3842", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2019-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1668521" } ], "notes": [ { "category": "description", "text": "It was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", "title": "Vulnerability description" }, { "category": "summary", "text": "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\"", "title": "Vulnerability summary" }, { "category": "other", "text": "For the attack to be successful, a new session must be created by pam_systemd. This is done only if the calling process is not already part of a session. Red Hat Enterprise Linux, in its default PAM configurations, does not let a session sneak in without systemd knowing about it, since pam_systemd is always called in every PAM config file. Unless a wrong PAM config file is in place, this vulnerability cannot be triggered on Red Hat Enterprise Linux 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3842" }, { "category": "external", "summary": "RHBZ#1668521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3842", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3842" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3842", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3842" } ], "release_date": "2019-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:28:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1611" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\"" }, { "cve": "CVE-2020-13776", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845534" } ], "notes": [ { "category": "description", "text": "A flaw was found in systemd, where it mishandles numerical usernames beginning with decimal digits, or \"0x\" followed by hexadecimal digits. When the usernames are used by systemd, for example in service units, an unexpected user may be used instead. In some particular configurations, this flaw allows local attackers to elevate their privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits", "title": "Vulnerability summary" }, { "category": "other", "text": "The flaw is rated as Moderate because several uncommon conditions have to be met to make it exploitable. Numerical usernames with decimal digits or starting with \"0x\" followed by hexadecimal digits must exist on the system. Systemd would need to process those particular usernames (e.g. while using the `User=` directive in a systemd service unit). If the service was supposed to run as a regular user and the binary being executed can be controlled by a local attacker, he could abuse this flaw to unexpectedly execute code as a root when the service is started. If the service was run as a regular user to limit the impact of a possible flaw in the service, this flaw would not provide the intended additional protection.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13776" }, { "category": "external", "summary": "RHBZ#1845534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845534" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13776", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13776" } ], "release_date": "2020-05-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-05-18T15:28:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:1611" }, { "category": "workaround", "details": "Do not use `User=` directive in services with numerical usernames composed by decimal digits or starting with \"0x\" followed by hexadecimal digits (e.g. 0x[0-9A-Fa-f]+).", "product_ids": [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits" } ] }
ghsa-c23j-qp89-q76c
Vulnerability from github
In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".
{ "affected": [], "aliases": [ "CVE-2019-3842" ], "database_specific": { "cwe_ids": [ "CWE-863" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-04-09T21:29:00Z", "severity": "HIGH" }, "details": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", "id": "GHSA-c23j-qp89-q76c", "modified": "2022-05-13T01:04:09Z", "published": "2022-05-13T01:04:09Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3842" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/46743" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.