Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2014-7187
Vulnerability from cvelistv5
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T12:40:19.211Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { name: "HPSBST03131", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383138121313&w=2", }, { name: "SSRT101819", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/533593/100/0/threaded", }, { name: "HPSBMU03245", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "openSUSE-SU-2014:1229", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "61188", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61188", }, { name: "JVN#55667175", tags: [ "third-party-advisory", "x_refsource_JVN", "x_transferred", ], url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "openSUSE-SU-2014:1254", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", }, { name: "60433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60433", }, { name: "[oss-security] 20140925 Fwd: Non-upstream patches for bash", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://openwall.com/lists/oss-security/2014/09/25/32", }, { name: "HPSBMU03143", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "HPSBST03155", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.novell.com/security/cve/CVE-2014-7187.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61636", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61636", }, { name: "61816", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "61283", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61283", }, { name: "APPLE-SA-2015-09-30-3", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "openSUSE-SU-2014:1308", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", }, { name: "61654", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61654", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62312", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "RHSA-2014:1312", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1312.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61703", }, { name: "USN-2364-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2364-1", }, { name: "61065", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61065", }, { name: "HPSBST03129", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", tags: [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "61641", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61641", }, { name: "SUSE-SU-2014:1247", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2014/Oct/0", }, { name: "MDVSA-2015:164", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.apple.com/HT205267", }, { name: "HPSBMU03220", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60024", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60024", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { name: "61622", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61622", }, { name: "20140926 GNU Bash Environment Variable Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://openwall.com/lists/oss-security/2014/09/28/10", }, { name: "62343", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/62343", }, { name: "61565", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61565", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.suse.com/support/shellshock/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://support.apple.com/HT204244", }, { name: "HPSBST03157", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61313", }, { name: "SSRT101830", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "SSRT101742", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61873", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61873", }, { name: "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://openwall.com/lists/oss-security/2014/09/26/2", }, { name: "61485", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61485", }, { name: "openSUSE-SU-2014:1242", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", }, { name: "61618", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61618", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "HPSBST03154", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61312", }, { name: "60193", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60193", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "61479", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61479", }, { name: "60063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60063", }, { name: "60034", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60034", }, { name: "59907", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/59907", }, { name: "58200", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61643", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61503", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "RHSA-2014:1354", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1354.html", }, { name: "HPSBMU03236", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "HPSBST03148", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141694386919794&w=2", }, { name: "61552", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61552", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX200223", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", }, { name: "HPSBGN03138", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "61855", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61855", }, { name: "60044", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60044", }, { name: "61291", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "61287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61287", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "APPLE-SA-2015-01-27-4", tags: [ "vendor-advisory", "x_refsource_APPLE", "x_transferred", ], url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "HPSBGN03141", tags: [ "vendor-advisory", "x_refsource_HP", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "RHSA-2014:1311", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1311.html", }, { name: "61128", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61128", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://support.citrix.com/article/CTX200217", }, { name: "60055", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/60055", }, { name: "61550", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61550", }, { name: "61633", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61633", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "SUSE-SU-2014:1259", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", }, { name: "61328", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61328", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61129", }, { name: "61603", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61603", }, { name: "61857", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/61857", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2014-09-25T00:00:00", descriptions: [ { lang: "en", value: "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-09T18:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { name: "HPSBST03131", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383138121313&w=2", }, { name: "SSRT101819", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/533593/100/0/threaded", }, { name: "HPSBMU03245", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "openSUSE-SU-2014:1229", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "61188", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61188", }, { name: "JVN#55667175", tags: [ "third-party-advisory", "x_refsource_JVN", ], url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "openSUSE-SU-2014:1254", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", }, { name: "60433", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60433", }, { name: "[oss-security] 20140925 Fwd: Non-upstream patches for bash", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://openwall.com/lists/oss-security/2014/09/25/32", }, { name: "HPSBMU03143", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "HPSBST03155", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.novell.com/security/cve/CVE-2014-7187.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61636", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61636", }, { name: "61816", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "61283", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61283", }, { name: "APPLE-SA-2015-09-30-3", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "openSUSE-SU-2014:1308", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", }, { name: "61654", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61654", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62312", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "RHSA-2014:1312", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1312.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61703", }, { name: "USN-2364-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2364-1", }, { name: "61065", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61065", }, { name: "HPSBST03129", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", tags: [ "third-party-advisory", "x_refsource_JVNDB", ], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "61641", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61641", }, { name: "SUSE-SU-2014:1247", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2014/Oct/0", }, { name: "MDVSA-2015:164", tags: [ "vendor-advisory", "x_refsource_MANDRIVA", ], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.apple.com/HT205267", }, { name: "HPSBMU03220", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60024", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60024", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { name: "61622", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61622", }, { name: "20140926 GNU Bash Environment Variable Command Injection Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://openwall.com/lists/oss-security/2014/09/28/10", }, { name: "62343", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/62343", }, { name: "61565", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61565", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://www.suse.com/support/shellshock/", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://support.apple.com/HT204244", }, { name: "HPSBST03157", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61313", }, { name: "SSRT101830", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "SSRT101742", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61873", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61873", }, { name: "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://openwall.com/lists/oss-security/2014/09/26/2", }, { name: "61485", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61485", }, { name: "openSUSE-SU-2014:1242", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", }, { name: "61618", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61618", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "HPSBST03154", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61312", }, { name: "60193", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60193", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "61479", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61479", }, { name: "60063", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60063", }, { name: "60034", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60034", }, { name: "59907", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/59907", }, { name: "58200", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61643", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61503", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "RHSA-2014:1354", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1354.html", }, { name: "HPSBMU03236", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "HPSBST03148", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141694386919794&w=2", }, { name: "61552", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61552", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX200223", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", }, { name: "HPSBGN03138", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "61855", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61855", }, { name: "60044", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60044", }, { name: "61291", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "61287", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61287", }, { name: "HPSBGN03233", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "APPLE-SA-2015-01-27-4", tags: [ "vendor-advisory", "x_refsource_APPLE", ], url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "HPSBGN03141", tags: [ "vendor-advisory", "x_refsource_HP", ], url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "RHSA-2014:1311", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2014-1311.html", }, { name: "61128", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61128", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://support.citrix.com/article/CTX200217", }, { name: "60055", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/60055", }, { name: "61550", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61550", }, { name: "61633", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61633", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "SUSE-SU-2014:1259", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", }, { name: "61328", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61328", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61129", }, { name: "61603", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61603", }, { name: "61857", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/61857", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-7187", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { name: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", refsource: "CONFIRM", url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { name: "HPSBST03131", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383138121313&w=2", }, { name: "SSRT101819", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/533593/100/0/threaded", }, { name: "HPSBMU03245", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "openSUSE-SU-2014:1229", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "61188", refsource: "SECUNIA", url: "http://secunia.com/advisories/61188", }, { name: "JVN#55667175", refsource: "JVN", url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "openSUSE-SU-2014:1254", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", }, { name: "60433", refsource: "SECUNIA", url: "http://secunia.com/advisories/60433", }, { name: "[oss-security] 20140925 Fwd: Non-upstream patches for bash", refsource: "MLIST", url: "http://openwall.com/lists/oss-security/2014/09/25/32", }, { name: "HPSBMU03143", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "HPSBST03155", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { name: "http://support.novell.com/security/cve/CVE-2014-7187.html", refsource: "CONFIRM", url: "http://support.novell.com/security/cve/CVE-2014-7187.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61636", refsource: "SECUNIA", url: "http://secunia.com/advisories/61636", }, { name: "61816", refsource: "SECUNIA", url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", refsource: "SECUNIA", url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "61283", refsource: "SECUNIA", url: "http://secunia.com/advisories/61283", }, { name: "APPLE-SA-2015-09-30-3", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "openSUSE-SU-2014:1308", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", }, { name: "61654", refsource: "SECUNIA", url: "http://secunia.com/advisories/61654", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", refsource: "SECUNIA", url: "http://secunia.com/advisories/62312", }, { name: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", refsource: "CONFIRM", url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "RHSA-2014:1312", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1312.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", refsource: "SECUNIA", url: "http://secunia.com/advisories/61703", }, { name: "USN-2364-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2364-1", }, { name: "61065", refsource: "SECUNIA", url: "http://secunia.com/advisories/61065", }, { name: "HPSBST03129", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", refsource: "JVNDB", url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "61641", refsource: "SECUNIA", url: "http://secunia.com/advisories/61641", }, { name: "SUSE-SU-2014:1247", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", }, { name: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", refsource: "CONFIRM", url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2014/Oct/0", }, { name: "MDVSA-2015:164", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { name: "https://support.apple.com/HT205267", refsource: "CONFIRM", url: "https://support.apple.com/HT205267", }, { name: "HPSBMU03220", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60024", refsource: "SECUNIA", url: "http://secunia.com/advisories/60024", }, { name: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { name: "61622", refsource: "SECUNIA", url: "http://secunia.com/advisories/61622", }, { name: "20140926 GNU Bash Environment Variable Command Injection Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", refsource: "MLIST", url: "http://openwall.com/lists/oss-security/2014/09/28/10", }, { name: "62343", refsource: "SECUNIA", url: "http://secunia.com/advisories/62343", }, { name: "61565", refsource: "SECUNIA", url: "http://secunia.com/advisories/61565", }, { name: "https://www.suse.com/support/shellshock/", refsource: "CONFIRM", url: "https://www.suse.com/support/shellshock/", }, { name: "http://support.apple.com/HT204244", refsource: "CONFIRM", url: "http://support.apple.com/HT204244", }, { name: "HPSBST03157", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", refsource: "SECUNIA", url: "http://secunia.com/advisories/61313", }, { name: "SSRT101830", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "SSRT101742", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61873", refsource: "SECUNIA", url: "http://secunia.com/advisories/61873", }, { name: "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", refsource: "MLIST", url: "http://openwall.com/lists/oss-security/2014/09/26/2", }, { name: "61485", refsource: "SECUNIA", url: "http://secunia.com/advisories/61485", }, { name: "openSUSE-SU-2014:1242", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", }, { name: "61618", refsource: "SECUNIA", url: "http://secunia.com/advisories/61618", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "HPSBST03154", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", refsource: "SECUNIA", url: "http://secunia.com/advisories/61312", }, { name: "60193", refsource: "SECUNIA", url: "http://secunia.com/advisories/60193", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "61479", refsource: "SECUNIA", url: "http://secunia.com/advisories/61479", }, { name: "60063", refsource: "SECUNIA", url: "http://secunia.com/advisories/60063", }, { name: "60034", refsource: "SECUNIA", url: "http://secunia.com/advisories/60034", }, { name: "59907", refsource: "SECUNIA", url: "http://secunia.com/advisories/59907", }, { name: "58200", refsource: "SECUNIA", url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", refsource: "SECUNIA", url: "http://secunia.com/advisories/61643", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015721", refsource: "CONFIRM", url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", refsource: "SECUNIA", url: "http://secunia.com/advisories/61503", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "RHSA-2014:1354", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1354.html", }, { name: "HPSBMU03236", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { name: "http://www.qnap.com/i/en/support/con_show.php?cid=61", refsource: "CONFIRM", url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "HPSBST03148", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141694386919794&w=2", }, { name: "61552", refsource: "SECUNIA", url: "http://secunia.com/advisories/61552", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { name: "https://support.citrix.com/article/CTX200223", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX200223", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", }, { name: "HPSBGN03138", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "61855", refsource: "SECUNIA", url: "http://secunia.com/advisories/61855", }, { name: "60044", refsource: "SECUNIA", url: "http://secunia.com/advisories/60044", }, { name: "61291", refsource: "SECUNIA", url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "61287", refsource: "SECUNIA", url: "http://secunia.com/advisories/61287", }, { name: "HPSBGN03233", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "APPLE-SA-2015-01-27-4", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "HPSBGN03141", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "RHSA-2014:1311", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1311.html", }, { name: "61128", refsource: "SECUNIA", url: "http://secunia.com/advisories/61128", }, { name: "https://support.citrix.com/article/CTX200217", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX200217", }, { name: "60055", refsource: "SECUNIA", url: "http://secunia.com/advisories/60055", }, { name: "61550", refsource: "SECUNIA", url: "http://secunia.com/advisories/61550", }, { name: "61633", refsource: "SECUNIA", url: "http://secunia.com/advisories/61633", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { name: "https://kb.bluecoat.com/index?page=content&id=SA82", refsource: "CONFIRM", url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "SUSE-SU-2014:1259", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", }, { name: "61328", refsource: "SECUNIA", url: "http://secunia.com/advisories/61328", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", refsource: "SECUNIA", url: "http://secunia.com/advisories/61129", }, { name: "61603", refsource: "SECUNIA", url: "http://secunia.com/advisories/61603", }, { name: "61857", refsource: "SECUNIA", url: "http://secunia.com/advisories/61857", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2014-7187", datePublished: "2014-09-28T19:00:00", dateReserved: "2014-09-25T00:00:00", dateUpdated: "2024-08-06T12:40:19.211Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCAC75DF-FFF7-4721-9D47-6E29A5CCB7C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCF4B4BB-C5A0-4283-9657-FC61BC95C014\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B04CBBD-E855-48D7-A5C9-AEC2B38FF1F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"972BDA0A-25C8-4C02-8624-07D2462C214C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B9EDE56-A8C4-40A8-9D14-F6E86F464BD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAB4B8E1-E013-4DB5-AF65-70CC2AEC3B20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5428D5A-7443-4BDD-9690-E44DBDBCAC9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18A6E8C3-334D-443B-8AD6-F8A131490F4C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C74DAE6-8A77-47BF-B3ED-D76CD5AD75BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B631B7E-C59D-444F-80CE-DC2345A56E97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91C8E637-AD10-4854-AD60-A908D017DDA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"75AB7456-89E4-4F40-82D0-EED52CAEE670\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7E516F7-B6C6-4A0B-90F4-BC0F382E62E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E37A5D0-79EB-442D-B4B8-49F5137A3FA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE919509-57B0-4D13-9503-943D5BFED620\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F027515-A126-4899-B78E-121C8312002F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC05A483-FAFD-4C40-85BC-D2EE907B2B54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*\", \"matchCriteriaId\": \"097C61C9-4761-4D8F-9590-376FC1A5522B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCA81069-36E0-4035-B31F-A5281E10C760\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC216C39-2EA0-4B58-87EA-81A737E5D2E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88731DFF-B0B1-4325-A662-287D5E6E7265\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7BB3ECE-0E83-45EB-AC27-BA29E2C52D1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3FA313D8-2B28-4C73-A96B-7814C37F0725\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43630818-4A62-4766-AADC-AB87BE1C5553\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"202B9DB4-80DC-4D1C-8DA8-C06E89FF542A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37CB667F-26C8-46FA-81CE-1F6909AC006D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"755984AB-D061-45F0-8845-D7B78BA506E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC1DAC9F-711C-47EA-9BBC-0EDB2AF0A1AC\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \\\"word_lineno\\\" issue.\"}, {\"lang\": \"es\", \"value\": \"Error de superaci\\u00f3n de l\\u00edmite (off-by-one) en la funci\\u00f3n read_token_word en parse.y en GNU Bash hasta 4.3 bash43-026 permite a atacantes remotos causar una denegaci\\u00f3n de servicio (acceso a array fuera de rango y ca\\u00edda de la aplicaci\\u00f3n) o posiblemente tener otro impacto no especificado a trav\\u00e9s de profundamente anidados para bucles, tambi\\u00e9n conocido como el problema 'word_lineno'.\"}]", id: "CVE-2014-7187", lastModified: "2024-11-21T02:16:29.490", metrics: "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2014-09-28T19:55:06.270", references: "[{\"url\": \"http://jvn.jp/en/jp/JVN55667175/index.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141330468527613&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141345648114150&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141383026420882&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141383081521087&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141383138121313&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141383196021590&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141383244821813&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141383304022067&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141450491804793&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141576728022234&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141577137423233&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141577241923505&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141577297623641&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141585637922673&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141694386919794&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141879528318582&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141879528318582&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142118135300698&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142118135300698&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142118135300698&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142289270617409&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142289270617409&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142358026505815&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142358026505815&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142358078406056&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142721162228379&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142721162228379&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://openwall.com/lists/oss-security/2014/09/25/32\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://openwall.com/lists/oss-security/2014/09/26/2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://openwall.com/lists/oss-security/2014/09/28/10\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1311.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1312.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1354.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://seclists.org/fulldisclosure/2014/Oct/0\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/58200\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/59907\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/60024\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/60034\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/60044\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/60055\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/60063\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/60193\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/60433\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61065\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61128\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61129\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61188\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61283\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61287\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61291\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61312\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61313\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61328\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61442\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61479\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61485\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61503\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61550\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61552\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61565\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61603\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61618\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61622\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61633\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61636\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61641\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61643\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61654\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61703\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61816\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61855\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61857\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/61873\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/62312\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/62343\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://support.apple.com/HT204244\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://support.novell.com/security/cve/CVE-2014-7187.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685604\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685733\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685749\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685914\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686084\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686131\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686246\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686445\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686447\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686479\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686494\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21687079\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2015:164\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.novell.com/support/kb/doc.php?id=7015721\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.qnap.com/i/en/support/con_show.php?cid=61\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/533593/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-2364-1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2014-0010.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://kb.bluecoat.com/index?page=content&id=SA82\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content&id=SB10085\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://support.apple.com/HT205267\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://support.citrix.com/article/CTX200217\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://support.citrix.com/article/CTX200223\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.suse.com/support/shellshock/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://jvn.jp/en/jp/JVN55667175/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141330468527613&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141345648114150&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141383026420882&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141383081521087&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141383138121313&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141383196021590&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141383244821813&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141383304022067&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141450491804793&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141576728022234&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141577137423233&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141577241923505&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141577297623641&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141585637922673&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141694386919794&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141879528318582&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=141879528318582&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142118135300698&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142118135300698&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142118135300698&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142289270617409&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142289270617409&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142358026505815&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142358026505815&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142358078406056&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142721162228379&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=142721162228379&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://openwall.com/lists/oss-security/2014/09/25/32\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://openwall.com/lists/oss-security/2014/09/26/2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://openwall.com/lists/oss-security/2014/09/28/10\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1311.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1312.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1354.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://seclists.org/fulldisclosure/2014/Oct/0\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/58200\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/59907\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60024\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60034\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60044\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60055\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60063\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60193\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60433\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61065\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61128\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61129\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61188\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61283\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61287\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61291\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61312\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61313\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61328\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61442\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61479\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61485\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61503\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61550\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61552\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61565\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61603\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61618\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61622\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61633\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61636\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61641\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61643\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61654\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61703\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61816\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61855\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61857\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/61873\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/62312\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/62343\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.apple.com/HT204244\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.novell.com/security/cve/CVE-2014-7187.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685604\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685733\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685749\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685914\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686084\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686131\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686246\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686445\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686447\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686479\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686494\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21687079\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2015:164\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.novell.com/support/kb/doc.php?id=7015721\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.qnap.com/i/en/support/con_show.php?cid=61\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/533593/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-2364-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2014-0010.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://kb.bluecoat.com/index?page=content&id=SA82\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content&id=SB10085\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://support.apple.com/HT205267\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://support.citrix.com/article/CTX200217\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://support.citrix.com/article/CTX200223\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.suse.com/support/shellshock/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2014-7187\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-09-28T19:55:06.270\",\"lastModified\":\"2024-11-21T02:16:29.490\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \\\"word_lineno\\\" issue.\"},{\"lang\":\"es\",\"value\":\"Error de superación de límite (off-by-one) en la función read_token_word en parse.y en GNU Bash hasta 4.3 bash43-026 permite a atacantes remotos causar una denegación de servicio (acceso a array fuera de rango y caída de la aplicación) o posiblemente tener otro impacto no especificado a través de profundamente anidados para bucles, también conocido como el problema 'word_lineno'.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCAC75DF-FFF7-4721-9D47-6E29A5CCB7C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCF4B4BB-C5A0-4283-9657-FC61BC95C014\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B04CBBD-E855-48D7-A5C9-AEC2B38FF1F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"972BDA0A-25C8-4C02-8624-07D2462C214C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B9EDE56-A8C4-40A8-9D14-F6E86F464BD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAB4B8E1-E013-4DB5-AF65-70CC2AEC3B20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5428D5A-7443-4BDD-9690-E44DBDBCAC9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18A6E8C3-334D-443B-8AD6-F8A131490F4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C74DAE6-8A77-47BF-B3ED-D76CD5AD75BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B631B7E-C59D-444F-80CE-DC2345A56E97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91C8E637-AD10-4854-AD60-A908D017DDA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75AB7456-89E4-4F40-82D0-EED52CAEE670\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7E516F7-B6C6-4A0B-90F4-BC0F382E62E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E37A5D0-79EB-442D-B4B8-49F5137A3FA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE919509-57B0-4D13-9503-943D5BFED620\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F027515-A126-4899-B78E-121C8312002F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC05A483-FAFD-4C40-85BC-D2EE907B2B54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"097C61C9-4761-4D8F-9590-376FC1A5522B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCA81069-36E0-4035-B31F-A5281E10C760\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC216C39-2EA0-4B58-87EA-81A737E5D2E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88731DFF-B0B1-4325-A662-287D5E6E7265\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7BB3ECE-0E83-45EB-AC27-BA29E2C52D1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FA313D8-2B28-4C73-A96B-7814C37F0725\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43630818-4A62-4766-AADC-AB87BE1C5553\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"202B9DB4-80DC-4D1C-8DA8-C06E89FF542A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37CB667F-26C8-46FA-81CE-1F6909AC006D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"755984AB-D061-45F0-8845-D7B78BA506E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC1DAC9F-711C-47EA-9BBC-0EDB2AF0A1AC\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/jp/JVN55667175/index.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141330468527613&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141345648114150&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383026420882&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383081521087&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383138121313&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383196021590&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383244821813&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383304022067&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141450491804793&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141576728022234&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141577137423233&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141577241923505&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141577297623641&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141585637922673&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141694386919794&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141879528318582&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141879528318582&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142118135300698&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142118135300698&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142118135300698&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142289270617409&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142289270617409&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142358026505815&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142358026505815&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142358078406056&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142721162228379&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142721162228379&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://openwall.com/lists/oss-security/2014/09/25/32\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://openwall.com/lists/oss-security/2014/09/26/2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://openwall.com/lists/oss-security/2014/09/28/10\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1311.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1312.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1354.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://seclists.org/fulldisclosure/2014/Oct/0\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/58200\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/59907\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60024\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60034\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60044\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60055\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60063\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60193\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/60433\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61065\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61128\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61129\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61188\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61283\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61287\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61291\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61312\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61313\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61328\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61442\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61479\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61485\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61503\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61550\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61552\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61565\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61603\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61618\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61622\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61633\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61636\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61641\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61643\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61654\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61703\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61816\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61855\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61857\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/61873\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/62312\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/62343\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.apple.com/HT204244\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.novell.com/security/cve/CVE-2014-7187.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685604\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685733\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685749\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685914\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686084\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686131\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686246\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686445\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686447\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686479\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686494\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21687079\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:164\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015721\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.qnap.com/i/en/support/con_show.php?cid=61\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/533593/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2364-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2014-0010.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kb.bluecoat.com/index?page=content&id=SA82\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content&id=SB10085\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.apple.com/HT205267\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.citrix.com/article/CTX200217\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.citrix.com/article/CTX200223\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.suse.com/support/shellshock/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://jvn.jp/en/jp/JVN55667175/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141330468527613&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141345648114150&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383026420882&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383081521087&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383138121313&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383196021590&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383244821813&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141383304022067&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141450491804793&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141576728022234&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141577137423233&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141577241923505&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141577297623641&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141585637922673&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141694386919794&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141879528318582&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=141879528318582&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142118135300698&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142118135300698&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142118135300698&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142289270617409&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142289270617409&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142358026505815&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142358026505815&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142358078406056&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142721162228379&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=142721162228379&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://openwall.com/lists/oss-security/2014/09/25/32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://openwall.com/lists/oss-security/2014/09/26/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://openwall.com/lists/oss-security/2014/09/28/10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1311.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1312.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1354.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2014/Oct/0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/58200\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/59907\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60024\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60034\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60044\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60055\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60063\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60193\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60433\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61065\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61128\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61129\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61188\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61283\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61287\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61291\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61312\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61313\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61328\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61442\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61485\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61503\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61550\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61552\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61565\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61603\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61618\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61622\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61633\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61636\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61641\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61643\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61654\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61703\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61816\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61855\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61857\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/61873\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62312\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/62343\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/HT204244\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.novell.com/security/cve/CVE-2014-7187.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685604\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685733\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685749\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685914\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686084\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686131\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686246\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686445\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686447\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686494\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21687079\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:164\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015721\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.qnap.com/i/en/support/con_show.php?cid=61\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/533593/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2364-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2014-0010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kb.bluecoat.com/index?page=content&id=SA82\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content&id=SB10085\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/HT205267\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.citrix.com/article/CTX200217\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.citrix.com/article/CTX200223\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.suse.com/support/shellshock/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", }, }
rhsa-2014:1865
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated bash Shift_JIS packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5.9 Extended Update Support.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", title: "Topic", }, { category: "general", text: "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nShift_JIS, also known as \"SJIS\", is a character encoding for the Japanese\nlanguage. This package provides bash support for the Shift_JIS encoding.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll users who require Shift_JIS encoding support with Bash built-in\nfunctions are advised to upgrade to these updated packages, which contain a\nbackported patch to correct this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2014:1865", url: "https://access.redhat.com/errata/RHSA-2014:1865", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/articles/1200223", url: "https://access.redhat.com/articles/1200223", }, { category: "external", summary: "1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1865.json", }, ], title: "Red Hat Security Advisory: bash Shift_JIS security update", tracking: { current_release_date: "2024-11-14T16:27:19+00:00", generator: { date: "2024-11-14T16:27:19+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.0", }, }, id: "RHSA-2014:1865", initial_release_date: "2014-11-17T18:11:13+00:00", revision_history: [ { date: "2014-11-17T18:11:13+00:00", number: "1", summary: "Initial version", }, { date: "2014-11-17T18:11:14+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-14T16:27:19+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "SJIS (v. 5.9.z Server)", product: { name: "SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_sjis:5", }, }, }, ], category: "product_family", name: "RHEL S-JIS Service", }, { branches: [ { category: "product_version", name: "bash-0:3.2-32.el5_9.3.sjis.1.ia64", product: { name: "bash-0:3.2-32.el5_9.3.sjis.1.ia64", product_id: "bash-0:3.2-32.el5_9.3.sjis.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=ia64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3.sjis.1?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "bash-0:3.2-32.el5_9.3.sjis.1.i386", product: { name: "bash-0:3.2-32.el5_9.3.sjis.1.i386", product_id: "bash-0:3.2-32.el5_9.3.sjis.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=i386", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3.sjis.1?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, { branches: [ { category: "product_version", name: "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", product: { name: "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", product_id: "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3.sjis.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "bash-0:3.2-32.el5_9.3.sjis.1.src", product: { name: "bash-0:3.2-32.el5_9.3.sjis.1.src", product_id: "bash-0:3.2-32.el5_9.3.sjis.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.sjis.1.i386 as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", }, product_reference: "bash-0:3.2-32.el5_9.3.sjis.1.i386", relates_to_product_reference: "5Server-SJIS-5.9.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.sjis.1.ia64 as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", }, product_reference: "bash-0:3.2-32.el5_9.3.sjis.1.ia64", relates_to_product_reference: "5Server-SJIS-5.9.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.sjis.1.src as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", }, product_reference: "bash-0:3.2-32.el5_9.3.sjis.1.src", relates_to_product_reference: "5Server-SJIS-5.9.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.sjis.1.x86_64 as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", }, product_reference: "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", relates_to_product_reference: "5Server-SJIS-5.9.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386 as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", relates_to_product_reference: "5Server-SJIS-5.9.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64 as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", relates_to_product_reference: "5Server-SJIS-5.9.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64 as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", relates_to_product_reference: "5Server-SJIS-5.9.z", }, ], }, vulnerabilities: [ { cve: "CVE-2014-7169", cwe: { id: "CWE-228", name: "Improper Handling of Syntactically Invalid Structure", }, discovery_date: "2014-09-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146319", }, ], notes: [ { category: "description", text: "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", title: "Vulnerability description", }, { category: "summary", text: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "RHBZ#1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "external", summary: "RHSB-shellshock", url: "https://access.redhat.com/security/vulnerabilities/shellshock", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7169", url: "https://www.cve.org/CVERecord?id=CVE-2014-7169", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-11-17T18:11:13+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1865", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2022-01-28T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7186", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, discovery_date: "2014-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146791", }, ], notes: [ { category: "description", text: "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", title: "Vulnerability description", }, { category: "summary", text: "bash: parser can allow out-of-bounds memory access while handling redir_stack", title: "Vulnerability summary", }, { category: "other", text: "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7186", }, { category: "external", summary: "RHBZ#1146791", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146791", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7186", url: "https://www.cve.org/CVERecord?id=CVE-2014-7186", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", }, ], release_date: "2014-09-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-11-17T18:11:13+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1865", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: parser can allow out-of-bounds memory access while handling redir_stack", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7187", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2014-09-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146804", }, ], notes: [ { category: "description", text: "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", title: "Vulnerability description", }, { category: "summary", text: "bash: off-by-one error in deeply nested flow control constructs", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "RHBZ#1146804", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146804", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7187", url: "https://www.cve.org/CVERecord?id=CVE-2014-7187", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", }, ], release_date: "2014-09-26T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-11-17T18:11:13+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1865", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: off-by-one error in deeply nested flow control constructs", }, ], }
rhsa-2014:1354
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An updated rhev-hypervisor6 package that fixes several security issues is\nnow available.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", title: "Topic", }, { category: "general", text: "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: a subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain services\nand applications allow remote unauthenticated attackers to provide\nenvironment variables, allowing them to exploit this issue. (CVE-2014-6271)\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nA flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One)\ninput from certain RSA signatures. A remote attacker could use this flaw to\nforge RSA certificates by providing a specially crafted signature to an\napplication using NSS. (CVE-2014-1568)\n\nIt was discovered that the fixed-sized redir_stack could be forced to\noverflow in the Bash parser, resulting in memory corruption, and possibly\nleading to arbitrary code execution when evaluating untrusted input that\nwould not otherwise be run as code. (CVE-2014-7186)\n\nAn off-by-one error was discovered in the way Bash was handling deeply\nnested flow control constructs. Depending on the layout of the .bss\nsegment, this could allow arbitrary execution of code that would not\notherwise be executed by Bash. (CVE-2014-7187)\n\nRed Hat would like to thank Stephane Chazelas for reporting CVE-2014-6271,\nand the Mozilla project for reporting CVE-2014-1568. Upstream acknowledges\nAntoine Delignat-Lavaud and Intel Product Security Incident Response Team\nas the original reporters of CVE-2014-1568. The CVE-2014-7186 and\nCVE-2014-7187 issues were discovered by Florian Weimer of Red Hat Product\nSecurity.\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2014:1354", url: "https://access.redhat.com/errata/RHSA-2014:1354", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#critical", url: "https://access.redhat.com/security/updates/classification/#critical", }, { category: "external", summary: "1141597", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1141597", }, { category: "external", summary: "1145429", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1145429", }, { category: "external", summary: "1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "external", summary: "1146791", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146791", }, { category: "external", summary: "1146804", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146804", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1354.json", }, ], title: "Red Hat Security Advisory: rhev-hypervisor6 security update", tracking: { current_release_date: "2024-12-15T18:38:44+00:00", generator: { date: "2024-12-15T18:38:44+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.3", }, }, id: "RHSA-2014:1354", initial_release_date: "2014-10-02T18:40:05+00:00", revision_history: [ { date: "2014-10-02T18:40:05+00:00", number: "1", summary: "Initial version", }, { date: "2014-10-02T18:40:05+00:00", number: "2", summary: "Last updated version", }, { date: "2024-12-15T18:38:44+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "RHEV-M 3.4", product: { name: "RHEV-M 3.4", product_id: "6Server-RHEV-S-3.4", product_identification_helper: { cpe: "cpe:/a:redhat:rhev_manager:3", }, }, }, ], category: "product_family", name: "Red Hat Virtualization", }, { branches: [ { category: "product_version", name: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", product: { name: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", product_id: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", product_identification_helper: { purl: "pkg:rpm/redhat/rhev-hypervisor6@6.5-20140930.1.el6ev?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", product: { name: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", product_id: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhev-hypervisor6@6.5-20140930.1.el6ev?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch as a component of RHEV-M 3.4", product_id: "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", }, product_reference: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", relates_to_product_reference: "6Server-RHEV-S-3.4", }, { category: "default_component_of", full_product_name: { name: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src as a component of RHEV-M 3.4", product_id: "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", }, product_reference: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", relates_to_product_reference: "6Server-RHEV-S-3.4", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Mozilla project", ], }, { names: [ "Antoine Delignat-Lavaud", "Intel Product Security Incident Response Team", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2014-1568", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2014-09-23T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1145429", }, ], notes: [ { category: "description", text: "A flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One) input from certain RSA signatures. A remote attacker could use this flaw to forge RSA certificates by providing a specially crafted signature to an application using NSS.", title: "Vulnerability description", }, { category: "summary", text: "nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-1568", }, { category: "external", summary: "RHBZ#1145429", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1145429", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-1568", url: "https://www.cve.org/CVERecord?id=CVE-2014-1568", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-1568", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-1568", }, { category: "external", summary: "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html", url: "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-10-02T18:40:05+00:00", details: "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", product_ids: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1354", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N", version: "2.0", }, products: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73)", }, { cve: "CVE-2014-6271", cwe: { id: "CWE-78", name: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", }, discovery_date: "2014-09-12T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1141597", }, ], notes: [ { category: "description", text: "A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", title: "Vulnerability description", }, { category: "summary", text: "bash: specially-crafted environment variables can be used to inject shell commands", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-6271", }, { category: "external", summary: "RHBZ#1141597", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1141597", }, { category: "external", summary: "RHSB-shellshock", url: "https://access.redhat.com/security/vulnerabilities/shellshock", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-6271", url: "https://www.cve.org/CVERecord?id=CVE-2014-6271", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-6271", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-6271", }, { category: "external", summary: "https://access.redhat.com/articles/1200223", url: "https://access.redhat.com/articles/1200223", }, { category: "external", summary: "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack", url: "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-10-02T18:40:05+00:00", details: "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", product_ids: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1354", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, ], threats: [ { category: "exploit_status", date: "2022-01-28T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Critical", }, ], title: "bash: specially-crafted environment variables can be used to inject shell commands", }, { cve: "CVE-2014-7169", cwe: { id: "CWE-228", name: "Improper Handling of Syntactically Invalid Structure", }, discovery_date: "2014-09-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146319", }, ], notes: [ { category: "description", text: "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", title: "Vulnerability description", }, { category: "summary", text: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "RHBZ#1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "external", summary: "RHSB-shellshock", url: "https://access.redhat.com/security/vulnerabilities/shellshock", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7169", url: "https://www.cve.org/CVERecord?id=CVE-2014-7169", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-10-02T18:40:05+00:00", details: "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", product_ids: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1354", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, ], threats: [ { category: "exploit_status", date: "2022-01-28T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7186", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, discovery_date: "2014-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146791", }, ], notes: [ { category: "description", text: "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", title: "Vulnerability description", }, { category: "summary", text: "bash: parser can allow out-of-bounds memory access while handling redir_stack", title: "Vulnerability summary", }, { category: "other", text: "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7186", }, { category: "external", summary: "RHBZ#1146791", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146791", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7186", url: "https://www.cve.org/CVERecord?id=CVE-2014-7186", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", }, ], release_date: "2014-09-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-10-02T18:40:05+00:00", details: "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", product_ids: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1354", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: parser can allow out-of-bounds memory access while handling redir_stack", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7187", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2014-09-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146804", }, ], notes: [ { category: "description", text: "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", title: "Vulnerability description", }, { category: "summary", text: "bash: off-by-one error in deeply nested flow control constructs", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "RHBZ#1146804", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146804", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7187", url: "https://www.cve.org/CVERecord?id=CVE-2014-7187", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", }, ], release_date: "2014-09-26T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-10-02T18:40:05+00:00", details: "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", product_ids: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1354", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: off-by-one error in deeply nested flow control constructs", }, ], }
RHSA-2014:1354
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An updated rhev-hypervisor6 package that fixes several security issues is\nnow available.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", title: "Topic", }, { category: "general", text: "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: a subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain services\nand applications allow remote unauthenticated attackers to provide\nenvironment variables, allowing them to exploit this issue. (CVE-2014-6271)\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nA flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One)\ninput from certain RSA signatures. A remote attacker could use this flaw to\nforge RSA certificates by providing a specially crafted signature to an\napplication using NSS. (CVE-2014-1568)\n\nIt was discovered that the fixed-sized redir_stack could be forced to\noverflow in the Bash parser, resulting in memory corruption, and possibly\nleading to arbitrary code execution when evaluating untrusted input that\nwould not otherwise be run as code. (CVE-2014-7186)\n\nAn off-by-one error was discovered in the way Bash was handling deeply\nnested flow control constructs. Depending on the layout of the .bss\nsegment, this could allow arbitrary execution of code that would not\notherwise be executed by Bash. (CVE-2014-7187)\n\nRed Hat would like to thank Stephane Chazelas for reporting CVE-2014-6271,\nand the Mozilla project for reporting CVE-2014-1568. Upstream acknowledges\nAntoine Delignat-Lavaud and Intel Product Security Incident Response Team\nas the original reporters of CVE-2014-1568. The CVE-2014-7186 and\nCVE-2014-7187 issues were discovered by Florian Weimer of Red Hat Product\nSecurity.\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2014:1354", url: "https://access.redhat.com/errata/RHSA-2014:1354", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#critical", url: "https://access.redhat.com/security/updates/classification/#critical", }, { category: "external", summary: "1141597", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1141597", }, { category: "external", summary: "1145429", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1145429", }, { category: "external", summary: "1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "external", summary: "1146791", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146791", }, { category: "external", summary: "1146804", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146804", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1354.json", }, ], title: "Red Hat Security Advisory: rhev-hypervisor6 security update", tracking: { current_release_date: "2024-12-15T18:38:44+00:00", generator: { date: "2024-12-15T18:38:44+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.3", }, }, id: "RHSA-2014:1354", initial_release_date: "2014-10-02T18:40:05+00:00", revision_history: [ { date: "2014-10-02T18:40:05+00:00", number: "1", summary: "Initial version", }, { date: "2014-10-02T18:40:05+00:00", number: "2", summary: "Last updated version", }, { date: "2024-12-15T18:38:44+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "RHEV-M 3.4", product: { name: "RHEV-M 3.4", product_id: "6Server-RHEV-S-3.4", product_identification_helper: { cpe: "cpe:/a:redhat:rhev_manager:3", }, }, }, ], category: "product_family", name: "Red Hat Virtualization", }, { branches: [ { category: "product_version", name: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", product: { name: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", product_id: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", product_identification_helper: { purl: "pkg:rpm/redhat/rhev-hypervisor6@6.5-20140930.1.el6ev?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", product: { name: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", product_id: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhev-hypervisor6@6.5-20140930.1.el6ev?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch as a component of RHEV-M 3.4", product_id: "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", }, product_reference: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", relates_to_product_reference: "6Server-RHEV-S-3.4", }, { category: "default_component_of", full_product_name: { name: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src as a component of RHEV-M 3.4", product_id: "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", }, product_reference: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", relates_to_product_reference: "6Server-RHEV-S-3.4", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Mozilla project", ], }, { names: [ "Antoine Delignat-Lavaud", "Intel Product Security Incident Response Team", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2014-1568", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2014-09-23T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1145429", }, ], notes: [ { category: "description", text: "A flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One) input from certain RSA signatures. A remote attacker could use this flaw to forge RSA certificates by providing a specially crafted signature to an application using NSS.", title: "Vulnerability description", }, { category: "summary", text: "nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-1568", }, { category: "external", summary: "RHBZ#1145429", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1145429", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-1568", url: "https://www.cve.org/CVERecord?id=CVE-2014-1568", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-1568", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-1568", }, { category: "external", summary: "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html", url: "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-10-02T18:40:05+00:00", details: "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", product_ids: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1354", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N", version: "2.0", }, products: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73)", }, { cve: "CVE-2014-6271", cwe: { id: "CWE-78", name: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", }, discovery_date: "2014-09-12T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1141597", }, ], notes: [ { category: "description", text: "A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", title: "Vulnerability description", }, { category: "summary", text: "bash: specially-crafted environment variables can be used to inject shell commands", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-6271", }, { category: "external", summary: "RHBZ#1141597", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1141597", }, { category: "external", summary: "RHSB-shellshock", url: "https://access.redhat.com/security/vulnerabilities/shellshock", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-6271", url: "https://www.cve.org/CVERecord?id=CVE-2014-6271", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-6271", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-6271", }, { category: "external", summary: "https://access.redhat.com/articles/1200223", url: "https://access.redhat.com/articles/1200223", }, { category: "external", summary: "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack", url: "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-10-02T18:40:05+00:00", details: "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", product_ids: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1354", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, ], threats: [ { category: "exploit_status", date: "2022-01-28T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Critical", }, ], title: "bash: specially-crafted environment variables can be used to inject shell commands", }, { cve: "CVE-2014-7169", cwe: { id: "CWE-228", name: "Improper Handling of Syntactically Invalid Structure", }, discovery_date: "2014-09-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146319", }, ], notes: [ { category: "description", text: "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", title: "Vulnerability description", }, { category: "summary", text: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "RHBZ#1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "external", summary: "RHSB-shellshock", url: "https://access.redhat.com/security/vulnerabilities/shellshock", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7169", url: "https://www.cve.org/CVERecord?id=CVE-2014-7169", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-10-02T18:40:05+00:00", details: "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", product_ids: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1354", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, ], threats: [ { category: "exploit_status", date: "2022-01-28T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7186", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, discovery_date: "2014-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146791", }, ], notes: [ { category: "description", text: "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", title: "Vulnerability description", }, { category: "summary", text: "bash: parser can allow out-of-bounds memory access while handling redir_stack", title: "Vulnerability summary", }, { category: "other", text: "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7186", }, { category: "external", summary: "RHBZ#1146791", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146791", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7186", url: "https://www.cve.org/CVERecord?id=CVE-2014-7186", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", }, ], release_date: "2014-09-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-10-02T18:40:05+00:00", details: "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", product_ids: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1354", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: parser can allow out-of-bounds memory access while handling redir_stack", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7187", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2014-09-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146804", }, ], notes: [ { category: "description", text: "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", title: "Vulnerability description", }, { category: "summary", text: "bash: off-by-one error in deeply nested flow control constructs", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "RHBZ#1146804", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146804", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7187", url: "https://www.cve.org/CVERecord?id=CVE-2014-7187", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", }, ], release_date: "2014-09-26T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-10-02T18:40:05+00:00", details: "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", product_ids: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1354", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: off-by-one error in deeply nested flow control constructs", }, ], }
rhsa-2014:1312
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "[Updated September 30, 2014]\nThis advisory has been updated with information on restarting system\nservices after applying this update. No changes have been made to the\noriginal packages.\n\nUpdated bash Shift_JIS packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", title: "Topic", }, { category: "general", text: "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nShift_JIS, also known as \"SJIS\", is a character encoding for the Japanese\nlanguage. This package provides bash support for the Shift_JIS encoding.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll users who require Shift_JIS encoding support with Bash built-in\nfunctions are advised to upgrade to these updated packages, which contain a\nbackported patch to correct this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2014:1312", url: "https://access.redhat.com/errata/RHSA-2014:1312", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/articles/1200223", url: "https://access.redhat.com/articles/1200223", }, { category: "external", summary: "1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1312.json", }, ], title: "Red Hat Security Advisory: bash Shift_JIS security update", tracking: { current_release_date: "2024-11-14T16:26:22+00:00", generator: { date: "2024-11-14T16:26:22+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.0", }, }, id: "RHSA-2014:1312", initial_release_date: "2014-09-26T21:28:16+00:00", revision_history: [ { date: "2014-09-26T21:28:16+00:00", number: "1", summary: "Initial version", }, { date: "2014-09-30T15:08:43+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-14T16:26:22+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "S-JIS for Red Hat Enteprise Linux 6 Server", product: { name: "S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_sjis:6", }, }, }, { category: "product_name", name: "S-JIS for Red Hat Enteprise Linux 5 Server", product: { name: "S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_sjis:5", }, }, }, ], category: "product_family", name: "RHEL S-JIS Service", }, { branches: [ { category: "product_version", name: "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", product: { name: "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", product_id: "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1.sjis.2?arch=i686", }, }, }, { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", product: { name: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", product_id: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.1.sjis.2?arch=i686", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", product: { name: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", product_id: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.1.sjis.2?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product: { name: "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product_id: "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1.sjis.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product: { name: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product_id: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.1.sjis.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product: { name: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product_id: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.1.sjis.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", product: { name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", product_id: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.1.sjis.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", product: { name: "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", product_id: "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "bash-0:4.1.2-15.el6_5.1.sjis.2.src", product: { name: "bash-0:4.1.2-15.el6_5.1.sjis.2.src", product_id: "bash-0:4.1.2-15.el6_5.1.sjis.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1.sjis.2?arch=src", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.1.sjis.2.src", product: { name: "bash-0:3.2-33.el5_11.1.sjis.2.src", product_id: "bash-0:3.2-33.el5_11.1.sjis.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", product: { name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", product_id: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.1.sjis.2?arch=ia64", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.1.sjis.2.ia64", product: { name: "bash-0:3.2-33.el5_11.1.sjis.2.ia64", product_id: "bash-0:3.2-33.el5_11.1.sjis.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", product: { name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", product_id: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.1.sjis.2?arch=i386", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.1.sjis.2.i386", product: { name: "bash-0:3.2-33.el5_11.1.sjis.2.i386", product_id: "bash-0:3.2-33.el5_11.1.sjis.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.1.sjis.2.i386 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", }, product_reference: "bash-0:3.2-33.el5_11.1.sjis.2.i386", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.1.sjis.2.ia64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", }, product_reference: "bash-0:3.2-33.el5_11.1.sjis.2.ia64", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.1.sjis.2.src as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", }, product_reference: "bash-0:3.2-33.el5_11.1.sjis.2.src", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", }, product_reference: "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.1.sjis.2.i686 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.1.sjis.2.src as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.1.sjis.2.src", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, ], }, vulnerabilities: [ { cve: "CVE-2014-7169", cwe: { id: "CWE-228", name: "Improper Handling of Syntactically Invalid Structure", }, discovery_date: "2014-09-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146319", }, ], notes: [ { category: "description", text: "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", title: "Vulnerability description", }, { category: "summary", text: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "RHBZ#1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "external", summary: "RHSB-shellshock", url: "https://access.redhat.com/security/vulnerabilities/shellshock", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7169", url: "https://www.cve.org/CVERecord?id=CVE-2014-7169", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T21:28:16+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1312", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2022-01-28T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7186", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, discovery_date: "2014-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146791", }, ], notes: [ { category: "description", text: "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", title: "Vulnerability description", }, { category: "summary", text: "bash: parser can allow out-of-bounds memory access while handling redir_stack", title: "Vulnerability summary", }, { category: "other", text: "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7186", }, { category: "external", summary: "RHBZ#1146791", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146791", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7186", url: "https://www.cve.org/CVERecord?id=CVE-2014-7186", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", }, ], release_date: "2014-09-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T21:28:16+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1312", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: parser can allow out-of-bounds memory access while handling redir_stack", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7187", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2014-09-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146804", }, ], notes: [ { category: "description", text: "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", title: "Vulnerability description", }, { category: "summary", text: "bash: off-by-one error in deeply nested flow control constructs", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "RHBZ#1146804", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146804", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7187", url: "https://www.cve.org/CVERecord?id=CVE-2014-7187", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", }, ], release_date: "2014-09-26T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T21:28:16+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1312", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: off-by-one error in deeply nested flow control constructs", }, ], }
rhsa-2014_1865
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated bash Shift_JIS packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5.9 Extended Update Support.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", title: "Topic", }, { category: "general", text: "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nShift_JIS, also known as \"SJIS\", is a character encoding for the Japanese\nlanguage. This package provides bash support for the Shift_JIS encoding.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll users who require Shift_JIS encoding support with Bash built-in\nfunctions are advised to upgrade to these updated packages, which contain a\nbackported patch to correct this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2014:1865", url: "https://access.redhat.com/errata/RHSA-2014:1865", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/articles/1200223", url: "https://access.redhat.com/articles/1200223", }, { category: "external", summary: "1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1865.json", }, ], title: "Red Hat Security Advisory: bash Shift_JIS security update", tracking: { current_release_date: "2024-11-14T16:27:19+00:00", generator: { date: "2024-11-14T16:27:19+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.0", }, }, id: "RHSA-2014:1865", initial_release_date: "2014-11-17T18:11:13+00:00", revision_history: [ { date: "2014-11-17T18:11:13+00:00", number: "1", summary: "Initial version", }, { date: "2014-11-17T18:11:14+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-14T16:27:19+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "SJIS (v. 5.9.z Server)", product: { name: "SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_sjis:5", }, }, }, ], category: "product_family", name: "RHEL S-JIS Service", }, { branches: [ { category: "product_version", name: "bash-0:3.2-32.el5_9.3.sjis.1.ia64", product: { name: "bash-0:3.2-32.el5_9.3.sjis.1.ia64", product_id: "bash-0:3.2-32.el5_9.3.sjis.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=ia64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3.sjis.1?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "bash-0:3.2-32.el5_9.3.sjis.1.i386", product: { name: "bash-0:3.2-32.el5_9.3.sjis.1.i386", product_id: "bash-0:3.2-32.el5_9.3.sjis.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=i386", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3.sjis.1?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, { branches: [ { category: "product_version", name: "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", product: { name: "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", product_id: "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3.sjis.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "bash-0:3.2-32.el5_9.3.sjis.1.src", product: { name: "bash-0:3.2-32.el5_9.3.sjis.1.src", product_id: "bash-0:3.2-32.el5_9.3.sjis.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.sjis.1.i386 as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", }, product_reference: "bash-0:3.2-32.el5_9.3.sjis.1.i386", relates_to_product_reference: "5Server-SJIS-5.9.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.sjis.1.ia64 as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", }, product_reference: "bash-0:3.2-32.el5_9.3.sjis.1.ia64", relates_to_product_reference: "5Server-SJIS-5.9.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.sjis.1.src as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", }, product_reference: "bash-0:3.2-32.el5_9.3.sjis.1.src", relates_to_product_reference: "5Server-SJIS-5.9.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.sjis.1.x86_64 as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", }, product_reference: "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", relates_to_product_reference: "5Server-SJIS-5.9.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386 as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", relates_to_product_reference: "5Server-SJIS-5.9.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64 as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", relates_to_product_reference: "5Server-SJIS-5.9.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64 as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", relates_to_product_reference: "5Server-SJIS-5.9.z", }, ], }, vulnerabilities: [ { cve: "CVE-2014-7169", cwe: { id: "CWE-228", name: "Improper Handling of Syntactically Invalid Structure", }, discovery_date: "2014-09-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146319", }, ], notes: [ { category: "description", text: "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", title: "Vulnerability description", }, { category: "summary", text: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "RHBZ#1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "external", summary: "RHSB-shellshock", url: "https://access.redhat.com/security/vulnerabilities/shellshock", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7169", url: "https://www.cve.org/CVERecord?id=CVE-2014-7169", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-11-17T18:11:13+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1865", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2022-01-28T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7186", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, discovery_date: "2014-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146791", }, ], notes: [ { category: "description", text: "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", title: "Vulnerability description", }, { category: "summary", text: "bash: parser can allow out-of-bounds memory access while handling redir_stack", title: "Vulnerability summary", }, { category: "other", text: "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7186", }, { category: "external", summary: "RHBZ#1146791", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146791", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7186", url: "https://www.cve.org/CVERecord?id=CVE-2014-7186", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", }, ], release_date: "2014-09-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-11-17T18:11:13+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1865", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: parser can allow out-of-bounds memory access while handling redir_stack", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7187", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2014-09-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146804", }, ], notes: [ { category: "description", text: "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", title: "Vulnerability description", }, { category: "summary", text: "bash: off-by-one error in deeply nested flow control constructs", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "RHBZ#1146804", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146804", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7187", url: "https://www.cve.org/CVERecord?id=CVE-2014-7187", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", }, ], release_date: "2014-09-26T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-11-17T18:11:13+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1865", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: off-by-one error in deeply nested flow control constructs", }, ], }
RHSA-2014:1306
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "[Updated September 30, 2014]\nThis advisory has been updated with information on restarting system\nservices after applying this update. No changes have been made to the\noriginal packages.\n\nUpdated bash packages that fix one security issue are now available for Red\nHat Enterprise Linux 5, 6, and 7.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", title: "Topic", }, { category: "general", text: "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2014:1306", url: "https://access.redhat.com/errata/RHSA-2014:1306", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/articles/1200223", url: "https://access.redhat.com/articles/1200223", }, { category: "external", summary: "1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1306.json", }, ], title: "Red Hat Security Advisory: bash security update", tracking: { current_release_date: "2025-03-19T13:58:19+00:00", generator: { date: "2025-03-19T13:58:19+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2014:1306", initial_release_date: "2014-09-26T01:46:36+00:00", revision_history: [ { date: "2014-09-26T01:46:36+00:00", number: "1", summary: "Initial version", }, { date: "2014-09-30T16:02:45+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-19T13:58:19+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Desktop (v. 6)", product: { name: "Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop Optional (v. 6)", product: { name: "Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux HPC Node (v. 6)", product: { name: "Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux HPC Node Optional (v. 6)", product: { name: "Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 6)", product: { name: "Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 6)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 6)", product: { name: "Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 6)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Client (v. 7)", product: { name: "Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Client Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop (v. 5 client)", product: { name: "Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux (v. 5 server)", product: { name: "Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "bash-0:4.1.2-15.el6_5.2.src", product: { name: "bash-0:4.1.2-15.el6_5.2.src", product_id: "bash-0:4.1.2-15.el6_5.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=src", }, }, }, { category: "product_version", name: "bash-0:4.2.45-5.el7_0.4.src", product: { name: "bash-0:4.2.45-5.el7_0.4.src", product_id: "bash-0:4.2.45-5.el7_0.4.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=src", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.4.src", product: { name: "bash-0:3.2-33.el5_11.4.src", product_id: "bash-0:3.2-33.el5_11.4.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", product: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", product_id: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=i686", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_5.2.i686", product: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686", product_id: "bash-doc-0:4.1.2-15.el6_5.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=i686", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_5.2.i686", product: { name: "bash-0:4.1.2-15.el6_5.2.i686", product_id: "bash-0:4.1.2-15.el6_5.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", product: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", product_id: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", product: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", product_id: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_5.2.x86_64", product: { name: "bash-0:4.1.2-15.el6_5.2.x86_64", product_id: "bash-0:4.1.2-15.el6_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", product: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", product_id: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.2.45-5.el7_0.4?arch=x86_64", }, }, }, { category: "product_version", name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", product: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", product_id: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.2.45-5.el7_0.4?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:4.2.45-5.el7_0.4.x86_64", product: { name: "bash-0:4.2.45-5.el7_0.4.x86_64", product_id: "bash-0:4.2.45-5.el7_0.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", product: { name: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", product_id: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.4.x86_64", product: { name: "bash-0:3.2-33.el5_11.4.x86_64", product_id: "bash-0:3.2-33.el5_11.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", product: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", product_id: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=s390x", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_5.2.s390x", product: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x", product_id: "bash-doc-0:4.1.2-15.el6_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=s390x", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_5.2.s390x", product: { name: "bash-0:4.1.2-15.el6_5.2.s390x", product_id: "bash-0:4.1.2-15.el6_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=s390x", }, }, }, { category: "product_version", name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", product: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", product_id: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.2.45-5.el7_0.4?arch=s390x", }, }, }, { category: "product_version", name: "bash-doc-0:4.2.45-5.el7_0.4.s390x", product: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x", product_id: "bash-doc-0:4.2.45-5.el7_0.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.2.45-5.el7_0.4?arch=s390x", }, }, }, { category: "product_version", name: "bash-0:4.2.45-5.el7_0.4.s390x", product: { name: "bash-0:4.2.45-5.el7_0.4.s390x", product_id: "bash-0:4.2.45-5.el7_0.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=s390x", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.4.s390x", product: { name: "bash-debuginfo-0:3.2-33.el5_11.4.s390x", product_id: "bash-debuginfo-0:3.2-33.el5_11.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=s390x", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.4.s390x", product: { name: "bash-0:3.2-33.el5_11.4.s390x", product_id: "bash-0:3.2-33.el5_11.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", product: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", product_id: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=ppc64", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", product: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", product_id: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=ppc64", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_5.2.ppc64", product: { name: "bash-0:4.1.2-15.el6_5.2.ppc64", product_id: "bash-0:4.1.2-15.el6_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=ppc64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", product: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", product_id: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.2.45-5.el7_0.4?arch=ppc64", }, }, }, { category: "product_version", name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", product: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", product_id: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.2.45-5.el7_0.4?arch=ppc64", }, }, }, { category: "product_version", name: "bash-0:4.2.45-5.el7_0.4.ppc64", product: { name: "bash-0:4.2.45-5.el7_0.4.ppc64", product_id: "bash-0:4.2.45-5.el7_0.4.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.4.i386", product: { name: "bash-debuginfo-0:3.2-33.el5_11.4.i386", product_id: "bash-debuginfo-0:3.2-33.el5_11.4.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=i386", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.4.i386", product: { name: "bash-0:3.2-33.el5_11.4.i386", product_id: "bash-0:3.2-33.el5_11.4.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.4.ia64", product: { name: "bash-debuginfo-0:3.2-33.el5_11.4.ia64", product_id: "bash-debuginfo-0:3.2-33.el5_11.4.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=ia64", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.4.ia64", product: { name: "bash-0:3.2-33.el5_11.4.ia64", product_id: "bash-0:3.2-33.el5_11.4.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.4.ppc", product: { name: "bash-debuginfo-0:3.2-33.el5_11.4.ppc", product_id: "bash-debuginfo-0:3.2-33.el5_11.4.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=ppc", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.4.ppc", product: { name: "bash-0:3.2-33.el5_11.4.ppc", product_id: "bash-0:3.2-33.el5_11.4.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", }, product_reference: "bash-0:3.2-33.el5_11.4.i386", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", }, product_reference: "bash-0:3.2-33.el5_11.4.ia64", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", }, product_reference: "bash-0:3.2-33.el5_11.4.ppc", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", }, product_reference: "bash-0:3.2-33.el5_11.4.s390x", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", }, product_reference: "bash-0:3.2-33.el5_11.4.src", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", }, product_reference: "bash-0:3.2-33.el5_11.4.x86_64", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.i386", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.ia64", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.ppc", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.s390x", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", }, product_reference: "bash-0:3.2-33.el5_11.4.i386", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", }, product_reference: "bash-0:3.2-33.el5_11.4.ia64", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", }, product_reference: "bash-0:3.2-33.el5_11.4.ppc", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", }, product_reference: "bash-0:3.2-33.el5_11.4.s390x", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.src as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", }, product_reference: "bash-0:3.2-33.el5_11.4.src", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", }, product_reference: "bash-0:3.2-33.el5_11.4.x86_64", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.i386", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.ia64", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.ppc", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.s390x", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, ], }, vulnerabilities: [ { cve: "CVE-2014-7169", cwe: { id: "CWE-228", name: "Improper Handling of Syntactically Invalid Structure", }, discovery_date: "2014-09-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146319", }, ], notes: [ { category: "description", text: "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", title: "Vulnerability description", }, { category: "summary", text: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "RHBZ#1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "external", summary: "RHSB-shellshock", url: "https://access.redhat.com/security/vulnerabilities/shellshock", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7169", url: "https://www.cve.org/CVERecord?id=CVE-2014-7169", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T01:46:36+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1306", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2022-01-28T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7186", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, discovery_date: "2014-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146791", }, ], notes: [ { category: "description", text: "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", title: "Vulnerability description", }, { category: "summary", text: "bash: parser can allow out-of-bounds memory access while handling redir_stack", title: "Vulnerability summary", }, { category: "other", text: "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7186", }, { category: "external", summary: "RHBZ#1146791", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146791", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7186", url: "https://www.cve.org/CVERecord?id=CVE-2014-7186", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", }, ], release_date: "2014-09-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T01:46:36+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1306", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: parser can allow out-of-bounds memory access while handling redir_stack", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7187", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2014-09-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146804", }, ], notes: [ { category: "description", text: "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", title: "Vulnerability description", }, { category: "summary", text: "bash: off-by-one error in deeply nested flow control constructs", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "RHBZ#1146804", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146804", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7187", url: "https://www.cve.org/CVERecord?id=CVE-2014-7187", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", }, ], release_date: "2014-09-26T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T01:46:36+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1306", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: off-by-one error in deeply nested flow control constructs", }, ], }
rhsa-2014_1312
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "[Updated September 30, 2014]\nThis advisory has been updated with information on restarting system\nservices after applying this update. No changes have been made to the\noriginal packages.\n\nUpdated bash Shift_JIS packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", title: "Topic", }, { category: "general", text: "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nShift_JIS, also known as \"SJIS\", is a character encoding for the Japanese\nlanguage. This package provides bash support for the Shift_JIS encoding.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll users who require Shift_JIS encoding support with Bash built-in\nfunctions are advised to upgrade to these updated packages, which contain a\nbackported patch to correct this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2014:1312", url: "https://access.redhat.com/errata/RHSA-2014:1312", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/articles/1200223", url: "https://access.redhat.com/articles/1200223", }, { category: "external", summary: "1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1312.json", }, ], title: "Red Hat Security Advisory: bash Shift_JIS security update", tracking: { current_release_date: "2024-11-14T16:26:22+00:00", generator: { date: "2024-11-14T16:26:22+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.0", }, }, id: "RHSA-2014:1312", initial_release_date: "2014-09-26T21:28:16+00:00", revision_history: [ { date: "2014-09-26T21:28:16+00:00", number: "1", summary: "Initial version", }, { date: "2014-09-30T15:08:43+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-14T16:26:22+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "S-JIS for Red Hat Enteprise Linux 6 Server", product: { name: "S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_sjis:6", }, }, }, { category: "product_name", name: "S-JIS for Red Hat Enteprise Linux 5 Server", product: { name: "S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_sjis:5", }, }, }, ], category: "product_family", name: "RHEL S-JIS Service", }, { branches: [ { category: "product_version", name: "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", product: { name: "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", product_id: "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1.sjis.2?arch=i686", }, }, }, { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", product: { name: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", product_id: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.1.sjis.2?arch=i686", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", product: { name: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", product_id: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.1.sjis.2?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product: { name: "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product_id: "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1.sjis.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product: { name: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product_id: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.1.sjis.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product: { name: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product_id: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.1.sjis.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", product: { name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", product_id: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.1.sjis.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", product: { name: "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", product_id: "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "bash-0:4.1.2-15.el6_5.1.sjis.2.src", product: { name: "bash-0:4.1.2-15.el6_5.1.sjis.2.src", product_id: "bash-0:4.1.2-15.el6_5.1.sjis.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1.sjis.2?arch=src", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.1.sjis.2.src", product: { name: "bash-0:3.2-33.el5_11.1.sjis.2.src", product_id: "bash-0:3.2-33.el5_11.1.sjis.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", product: { name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", product_id: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.1.sjis.2?arch=ia64", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.1.sjis.2.ia64", product: { name: "bash-0:3.2-33.el5_11.1.sjis.2.ia64", product_id: "bash-0:3.2-33.el5_11.1.sjis.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", product: { name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", product_id: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.1.sjis.2?arch=i386", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.1.sjis.2.i386", product: { name: "bash-0:3.2-33.el5_11.1.sjis.2.i386", product_id: "bash-0:3.2-33.el5_11.1.sjis.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.1.sjis.2.i386 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", }, product_reference: "bash-0:3.2-33.el5_11.1.sjis.2.i386", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.1.sjis.2.ia64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", }, product_reference: "bash-0:3.2-33.el5_11.1.sjis.2.ia64", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.1.sjis.2.src as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", }, product_reference: "bash-0:3.2-33.el5_11.1.sjis.2.src", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", }, product_reference: "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.1.sjis.2.i686 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.1.sjis.2.src as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.1.sjis.2.src", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, ], }, vulnerabilities: [ { cve: "CVE-2014-7169", cwe: { id: "CWE-228", name: "Improper Handling of Syntactically Invalid Structure", }, discovery_date: "2014-09-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146319", }, ], notes: [ { category: "description", text: "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", title: "Vulnerability description", }, { category: "summary", text: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "RHBZ#1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "external", summary: "RHSB-shellshock", url: "https://access.redhat.com/security/vulnerabilities/shellshock", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7169", url: "https://www.cve.org/CVERecord?id=CVE-2014-7169", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T21:28:16+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1312", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2022-01-28T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7186", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, discovery_date: "2014-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146791", }, ], notes: [ { category: "description", text: "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", title: "Vulnerability description", }, { category: "summary", text: "bash: parser can allow out-of-bounds memory access while handling redir_stack", title: "Vulnerability summary", }, { category: "other", text: "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7186", }, { category: "external", summary: "RHBZ#1146791", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146791", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7186", url: "https://www.cve.org/CVERecord?id=CVE-2014-7186", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", }, ], release_date: "2014-09-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T21:28:16+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1312", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: parser can allow out-of-bounds memory access while handling redir_stack", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7187", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2014-09-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146804", }, ], notes: [ { category: "description", text: "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", title: "Vulnerability description", }, { category: "summary", text: "bash: off-by-one error in deeply nested flow control constructs", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "RHBZ#1146804", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146804", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7187", url: "https://www.cve.org/CVERecord?id=CVE-2014-7187", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", }, ], release_date: "2014-09-26T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T21:28:16+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1312", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: off-by-one error in deeply nested flow control constructs", }, ], }
rhsa-2014_1354
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Critical", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An updated rhev-hypervisor6 package that fixes several security issues is\nnow available.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", title: "Topic", }, { category: "general", text: "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: a subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain services\nand applications allow remote unauthenticated attackers to provide\nenvironment variables, allowing them to exploit this issue. (CVE-2014-6271)\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nA flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One)\ninput from certain RSA signatures. A remote attacker could use this flaw to\nforge RSA certificates by providing a specially crafted signature to an\napplication using NSS. (CVE-2014-1568)\n\nIt was discovered that the fixed-sized redir_stack could be forced to\noverflow in the Bash parser, resulting in memory corruption, and possibly\nleading to arbitrary code execution when evaluating untrusted input that\nwould not otherwise be run as code. (CVE-2014-7186)\n\nAn off-by-one error was discovered in the way Bash was handling deeply\nnested flow control constructs. Depending on the layout of the .bss\nsegment, this could allow arbitrary execution of code that would not\notherwise be executed by Bash. (CVE-2014-7187)\n\nRed Hat would like to thank Stephane Chazelas for reporting CVE-2014-6271,\nand the Mozilla project for reporting CVE-2014-1568. Upstream acknowledges\nAntoine Delignat-Lavaud and Intel Product Security Incident Response Team\nas the original reporters of CVE-2014-1568. The CVE-2014-7186 and\nCVE-2014-7187 issues were discovered by Florian Weimer of Red Hat Product\nSecurity.\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2014:1354", url: "https://access.redhat.com/errata/RHSA-2014:1354", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#critical", url: "https://access.redhat.com/security/updates/classification/#critical", }, { category: "external", summary: "1141597", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1141597", }, { category: "external", summary: "1145429", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1145429", }, { category: "external", summary: "1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "external", summary: "1146791", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146791", }, { category: "external", summary: "1146804", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146804", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1354.json", }, ], title: "Red Hat Security Advisory: rhev-hypervisor6 security update", tracking: { current_release_date: "2024-12-15T18:38:44+00:00", generator: { date: "2024-12-15T18:38:44+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.3", }, }, id: "RHSA-2014:1354", initial_release_date: "2014-10-02T18:40:05+00:00", revision_history: [ { date: "2014-10-02T18:40:05+00:00", number: "1", summary: "Initial version", }, { date: "2014-10-02T18:40:05+00:00", number: "2", summary: "Last updated version", }, { date: "2024-12-15T18:38:44+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "RHEV-M 3.4", product: { name: "RHEV-M 3.4", product_id: "6Server-RHEV-S-3.4", product_identification_helper: { cpe: "cpe:/a:redhat:rhev_manager:3", }, }, }, ], category: "product_family", name: "Red Hat Virtualization", }, { branches: [ { category: "product_version", name: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", product: { name: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", product_id: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", product_identification_helper: { purl: "pkg:rpm/redhat/rhev-hypervisor6@6.5-20140930.1.el6ev?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", product: { name: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", product_id: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", product_identification_helper: { purl: "pkg:rpm/redhat/rhev-hypervisor6@6.5-20140930.1.el6ev?arch=noarch", }, }, }, ], category: "architecture", name: "noarch", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch as a component of RHEV-M 3.4", product_id: "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", }, product_reference: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", relates_to_product_reference: "6Server-RHEV-S-3.4", }, { category: "default_component_of", full_product_name: { name: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src as a component of RHEV-M 3.4", product_id: "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", }, product_reference: "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", relates_to_product_reference: "6Server-RHEV-S-3.4", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Mozilla project", ], }, { names: [ "Antoine Delignat-Lavaud", "Intel Product Security Incident Response Team", ], summary: "Acknowledged by upstream.", }, ], cve: "CVE-2014-1568", cwe: { id: "CWE-347", name: "Improper Verification of Cryptographic Signature", }, discovery_date: "2014-09-23T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1145429", }, ], notes: [ { category: "description", text: "A flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One) input from certain RSA signatures. A remote attacker could use this flaw to forge RSA certificates by providing a specially crafted signature to an application using NSS.", title: "Vulnerability description", }, { category: "summary", text: "nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-1568", }, { category: "external", summary: "RHBZ#1145429", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1145429", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-1568", url: "https://www.cve.org/CVERecord?id=CVE-2014-1568", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-1568", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-1568", }, { category: "external", summary: "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html", url: "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-10-02T18:40:05+00:00", details: "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", product_ids: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1354", }, ], scores: [ { cvss_v2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N", version: "2.0", }, products: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, ], threats: [ { category: "impact", details: "Important", }, ], title: "nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73)", }, { cve: "CVE-2014-6271", cwe: { id: "CWE-78", name: "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", }, discovery_date: "2014-09-12T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1141597", }, ], notes: [ { category: "description", text: "A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", title: "Vulnerability description", }, { category: "summary", text: "bash: specially-crafted environment variables can be used to inject shell commands", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-6271", }, { category: "external", summary: "RHBZ#1141597", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1141597", }, { category: "external", summary: "RHSB-shellshock", url: "https://access.redhat.com/security/vulnerabilities/shellshock", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-6271", url: "https://www.cve.org/CVERecord?id=CVE-2014-6271", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-6271", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-6271", }, { category: "external", summary: "https://access.redhat.com/articles/1200223", url: "https://access.redhat.com/articles/1200223", }, { category: "external", summary: "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack", url: "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-10-02T18:40:05+00:00", details: "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", product_ids: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1354", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, ], threats: [ { category: "exploit_status", date: "2022-01-28T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Critical", }, ], title: "bash: specially-crafted environment variables can be used to inject shell commands", }, { cve: "CVE-2014-7169", cwe: { id: "CWE-228", name: "Improper Handling of Syntactically Invalid Structure", }, discovery_date: "2014-09-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146319", }, ], notes: [ { category: "description", text: "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", title: "Vulnerability description", }, { category: "summary", text: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "RHBZ#1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "external", summary: "RHSB-shellshock", url: "https://access.redhat.com/security/vulnerabilities/shellshock", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7169", url: "https://www.cve.org/CVERecord?id=CVE-2014-7169", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-10-02T18:40:05+00:00", details: "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", product_ids: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1354", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, ], threats: [ { category: "exploit_status", date: "2022-01-28T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7186", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, discovery_date: "2014-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146791", }, ], notes: [ { category: "description", text: "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", title: "Vulnerability description", }, { category: "summary", text: "bash: parser can allow out-of-bounds memory access while handling redir_stack", title: "Vulnerability summary", }, { category: "other", text: "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7186", }, { category: "external", summary: "RHBZ#1146791", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146791", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7186", url: "https://www.cve.org/CVERecord?id=CVE-2014-7186", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", }, ], release_date: "2014-09-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-10-02T18:40:05+00:00", details: "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", product_ids: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1354", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: parser can allow out-of-bounds memory access while handling redir_stack", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7187", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2014-09-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146804", }, ], notes: [ { category: "description", text: "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", title: "Vulnerability description", }, { category: "summary", text: "bash: off-by-one error in deeply nested flow control constructs", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "RHBZ#1146804", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146804", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7187", url: "https://www.cve.org/CVERecord?id=CVE-2014-7187", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", }, ], release_date: "2014-09-26T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-10-02T18:40:05+00:00", details: "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html", product_ids: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1354", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch", "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: off-by-one error in deeply nested flow control constructs", }, ], }
rhsa-2014_1311
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "[Updated September 30, 2014]\nThis advisory has been updated with information on restarting system\nservices after applying this update. No changes have been made to the\noriginal packages.\n\nUpdated bash packages that fix one security issue are now available for Red\nHat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise\nLinux 5.6 Long Life, Red Hat Enterprise Linux 5.9 Extended Update Support,\nRed Hat Enterprise Linux 6.2 Advanced Update Support, and Red Hat\nEnterprise Linux 6.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", title: "Topic", }, { category: "general", text: "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2014:1311", url: "https://access.redhat.com/errata/RHSA-2014:1311", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/articles/1200223", url: "https://access.redhat.com/articles/1200223", }, { category: "external", summary: "1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1311.json", }, ], title: "Red Hat Security Advisory: bash security update", tracking: { current_release_date: "2024-11-14T16:26:16+00:00", generator: { date: "2024-11-14T16:26:16+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.0", }, }, id: "RHSA-2014:1311", initial_release_date: "2014-09-26T17:58:08+00:00", revision_history: [ { date: "2014-09-26T17:58:08+00:00", number: "1", summary: "Initial version", }, { date: "2014-09-30T15:08:45+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-14T16:26:16+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product: { name: "Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.4::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product: { name: "Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.4::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server EUS (v. 6.4)", product: { name: "Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.4::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product: { name: "Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.4::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server AUS (v. 6.2)", product: { name: "Red Hat Enterprise Linux Server AUS (v. 6.2)", product_id: "6Server-6.2.AUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_mission_critical:6.2::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", product: { name: "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", product_id: "6Server-optional-6.2.AUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_mission_critical:6.2::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Long Life (v. 5.6 server)", product: { name: "Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_mission_critical:5.6", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux EUS (v. 5.9 server)", product: { name: "Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:5.9", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux AS (v. 4 ELS)", product: { name: "Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_els:4::as", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ES (v. 4 ELS)", product: { name: "Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_els:4::es", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "bash-0:4.1.2-15.el6_4.2.src", product: { name: "bash-0:4.1.2-15.el6_4.2.src", product_id: "bash-0:4.1.2-15.el6_4.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=src", }, }, }, { category: "product_version", name: "bash-0:4.1.2-9.el6_2.2.src", product: { name: "bash-0:4.1.2-9.el6_2.2.src", product_id: "bash-0:4.1.2-9.el6_2.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-9.el6_2.2?arch=src", }, }, }, { category: "product_version", name: "bash-0:3.2-24.el5_6.2.src", product: { name: "bash-0:3.2-24.el5_6.2.src", product_id: "bash-0:3.2-24.el5_6.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=src", }, }, }, { category: "product_version", name: "bash-0:3.2-32.el5_9.3.src", product: { name: "bash-0:3.2-32.el5_9.3.src", product_id: "bash-0:3.2-32.el5_9.3.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=src", }, }, }, { category: "product_version", name: "bash-0:3.0-27.el4.4.src", product: { name: "bash-0:3.0-27.el4.4.src", product_id: "bash-0:3.0-27.el4.4.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", product: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", product_id: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=s390x", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_4.2.s390x", product: { name: "bash-doc-0:4.1.2-15.el6_4.2.s390x", product_id: "bash-doc-0:4.1.2-15.el6_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=s390x", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_4.2.s390x", product: { name: "bash-0:4.1.2-15.el6_4.2.s390x", product_id: "bash-0:4.1.2-15.el6_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=s390x", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.s390x", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.s390x", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=s390x", }, }, }, { category: "product_version", name: "bash-0:3.2-32.el5_9.3.s390x", product: { name: "bash-0:3.2-32.el5_9.3.s390x", product_id: "bash-0:3.2-32.el5_9.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", product: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", product_id: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=i686", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_4.2.i686", product: { name: "bash-doc-0:4.1.2-15.el6_4.2.i686", product_id: "bash-doc-0:4.1.2-15.el6_4.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=i686", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_4.2.i686", product: { name: "bash-0:4.1.2-15.el6_4.2.i686", product_id: "bash-0:4.1.2-15.el6_4.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", product: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", product_id: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", product: { name: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", product_id: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_4.2.x86_64", product: { name: "bash-0:4.1.2-15.el6_4.2.x86_64", product_id: "bash-0:4.1.2-15.el6_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", product: { name: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", product_id: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-9.el6_2.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-9.el6_2.2.x86_64", product: { name: "bash-doc-0:4.1.2-9.el6_2.2.x86_64", product_id: "bash-doc-0:4.1.2-9.el6_2.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-9.el6_2.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:4.1.2-9.el6_2.2.x86_64", product: { name: "bash-0:4.1.2-9.el6_2.2.x86_64", product_id: "bash-0:4.1.2-9.el6_2.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-9.el6_2.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:3.2-24.el5_6.2.x86_64", product: { name: "bash-0:3.2-24.el5_6.2.x86_64", product_id: "bash-0:3.2-24.el5_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", product: { name: "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", product_id: "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-24.el5_6.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:3.2-32.el5_9.3.x86_64", product: { name: "bash-0:3.2-32.el5_9.3.x86_64", product_id: "bash-0:3.2-32.el5_9.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.0-27.el4.4.x86_64", product: { name: "bash-debuginfo-0:3.0-27.el4.4.x86_64", product_id: "bash-debuginfo-0:3.0-27.el4.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.0-27.el4.4?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:3.0-27.el4.4.x86_64", product: { name: "bash-0:3.0-27.el4.4.x86_64", product_id: "bash-0:3.0-27.el4.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", product: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", product_id: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", product: { name: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", product_id: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_4.2.ppc64", product: { name: "bash-0:4.1.2-15.el6_4.2.ppc64", product_id: "bash-0:4.1.2-15.el6_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "bash-0:3.2-24.el5_6.2.ia64", product: { name: "bash-0:3.2-24.el5_6.2.ia64", product_id: "bash-0:3.2-24.el5_6.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=ia64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-24.el5_6.2.ia64", product: { name: "bash-debuginfo-0:3.2-24.el5_6.2.ia64", product_id: "bash-debuginfo-0:3.2-24.el5_6.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-24.el5_6.2?arch=ia64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.ia64", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.ia64", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=ia64", }, }, }, { category: "product_version", name: "bash-0:3.2-32.el5_9.3.ia64", product: { name: "bash-0:3.2-32.el5_9.3.ia64", product_id: "bash-0:3.2-32.el5_9.3.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=ia64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.0-27.el4.4.ia64", product: { name: "bash-debuginfo-0:3.0-27.el4.4.ia64", product_id: "bash-debuginfo-0:3.0-27.el4.4.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.0-27.el4.4?arch=ia64", }, }, }, { category: "product_version", name: "bash-0:3.0-27.el4.4.ia64", product: { name: "bash-0:3.0-27.el4.4.ia64", product_id: "bash-0:3.0-27.el4.4.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "bash-0:3.2-24.el5_6.2.i386", product: { name: "bash-0:3.2-24.el5_6.2.i386", product_id: "bash-0:3.2-24.el5_6.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=i386", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-24.el5_6.2.i386", product: { name: "bash-debuginfo-0:3.2-24.el5_6.2.i386", product_id: "bash-debuginfo-0:3.2-24.el5_6.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-24.el5_6.2?arch=i386", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.i386", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.i386", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=i386", }, }, }, { category: "product_version", name: "bash-0:3.2-32.el5_9.3.i386", product: { name: "bash-0:3.2-32.el5_9.3.i386", product_id: "bash-0:3.2-32.el5_9.3.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=i386", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.0-27.el4.4.i386", product: { name: "bash-debuginfo-0:3.0-27.el4.4.i386", product_id: "bash-debuginfo-0:3.0-27.el4.4.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.0-27.el4.4?arch=i386", }, }, }, { category: "product_version", name: "bash-0:3.0-27.el4.4.i386", product: { name: "bash-0:3.0-27.el4.4.i386", product_id: "bash-0:3.0-27.el4.4.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.ppc", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.ppc", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=ppc", }, }, }, { category: "product_version", name: "bash-0:3.2-32.el5_9.3.ppc", product: { name: "bash-0:3.2-32.el5_9.3.ppc", product_id: "bash-0:3.2-32.el5_9.3.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-0:3.0-27.el4.4.i386", }, product_reference: "bash-0:3.0-27.el4.4.i386", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-0:3.0-27.el4.4.ia64", }, product_reference: "bash-0:3.0-27.el4.4.ia64", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.src as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-0:3.0-27.el4.4.src", }, product_reference: "bash-0:3.0-27.el4.4.src", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", }, product_reference: "bash-0:3.0-27.el4.4.x86_64", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", }, product_reference: "bash-debuginfo-0:3.0-27.el4.4.i386", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", }, product_reference: "bash-debuginfo-0:3.0-27.el4.4.ia64", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", }, product_reference: "bash-debuginfo-0:3.0-27.el4.4.x86_64", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-0:3.0-27.el4.4.i386", }, product_reference: "bash-0:3.0-27.el4.4.i386", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-0:3.0-27.el4.4.ia64", }, product_reference: "bash-0:3.0-27.el4.4.ia64", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.src as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-0:3.0-27.el4.4.src", }, product_reference: "bash-0:3.0-27.el4.4.src", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", }, product_reference: "bash-0:3.0-27.el4.4.x86_64", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", }, product_reference: "bash-debuginfo-0:3.0-27.el4.4.i386", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", }, product_reference: "bash-debuginfo-0:3.0-27.el4.4.ia64", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", }, product_reference: "bash-debuginfo-0:3.0-27.el4.4.x86_64", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-24.el5_6.2.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", }, product_reference: "bash-0:3.2-24.el5_6.2.i386", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-24.el5_6.2.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", }, product_reference: "bash-0:3.2-24.el5_6.2.ia64", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-24.el5_6.2.src as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", }, product_reference: "bash-0:3.2-24.el5_6.2.src", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-24.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", }, product_reference: "bash-0:3.2-24.el5_6.2.x86_64", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-24.el5_6.2.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", }, product_reference: "bash-debuginfo-0:3.2-24.el5_6.2.i386", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-24.el5_6.2.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", }, product_reference: "bash-debuginfo-0:3.2-24.el5_6.2.ia64", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-24.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", }, product_reference: "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", }, product_reference: "bash-0:3.2-32.el5_9.3.i386", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", }, product_reference: "bash-0:3.2-32.el5_9.3.ia64", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", }, product_reference: "bash-0:3.2-32.el5_9.3.ppc", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", }, product_reference: "bash-0:3.2-32.el5_9.3.s390x", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.src as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", }, product_reference: "bash-0:3.2-32.el5_9.3.src", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", }, product_reference: "bash-0:3.2-32.el5_9.3.x86_64", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.i386", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.ia64", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.ppc", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.s390x", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", }, product_reference: "bash-0:4.1.2-15.el6_4.2.src", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", }, product_reference: "bash-0:4.1.2-15.el6_4.2.src", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-9.el6_2.2.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", product_id: "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", }, product_reference: "bash-0:4.1.2-9.el6_2.2.src", relates_to_product_reference: "6Server-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", product_id: "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", }, product_reference: "bash-0:4.1.2-9.el6_2.2.x86_64", relates_to_product_reference: "6Server-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", product_id: "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", relates_to_product_reference: "6Server-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", product_id: "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-9.el6_2.2.x86_64", relates_to_product_reference: "6Server-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", }, product_reference: "bash-0:4.1.2-15.el6_4.2.src", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-9.el6_2.2.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", product_id: "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", }, product_reference: "bash-0:4.1.2-9.el6_2.2.src", relates_to_product_reference: "6Server-optional-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", product_id: "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", }, product_reference: "bash-0:4.1.2-9.el6_2.2.x86_64", relates_to_product_reference: "6Server-optional-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", product_id: "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", relates_to_product_reference: "6Server-optional-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", product_id: "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-9.el6_2.2.x86_64", relates_to_product_reference: "6Server-optional-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", }, product_reference: "bash-0:4.1.2-15.el6_4.2.src", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6Server-optional-6.4.EUS", }, ], }, vulnerabilities: [ { cve: "CVE-2014-7169", cwe: { id: "CWE-228", name: "Improper Handling of Syntactically Invalid Structure", }, discovery_date: "2014-09-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146319", }, ], notes: [ { category: "description", text: "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", title: "Vulnerability description", }, { category: "summary", text: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "RHBZ#1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "external", summary: "RHSB-shellshock", url: "https://access.redhat.com/security/vulnerabilities/shellshock", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7169", url: "https://www.cve.org/CVERecord?id=CVE-2014-7169", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T17:58:08+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1311", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2022-01-28T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7186", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, discovery_date: "2014-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146791", }, ], notes: [ { category: "description", text: "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", title: "Vulnerability description", }, { category: "summary", text: "bash: parser can allow out-of-bounds memory access while handling redir_stack", title: "Vulnerability summary", }, { category: "other", text: "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7186", }, { category: "external", summary: "RHBZ#1146791", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146791", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7186", url: "https://www.cve.org/CVERecord?id=CVE-2014-7186", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", }, ], release_date: "2014-09-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T17:58:08+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1311", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: parser can allow out-of-bounds memory access while handling redir_stack", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7187", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2014-09-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146804", }, ], notes: [ { category: "description", text: "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", title: "Vulnerability description", }, { category: "summary", text: "bash: off-by-one error in deeply nested flow control constructs", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "RHBZ#1146804", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146804", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7187", url: "https://www.cve.org/CVERecord?id=CVE-2014-7187", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", }, ], release_date: "2014-09-26T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T17:58:08+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1311", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: off-by-one error in deeply nested flow control constructs", }, ], }
RHSA-2014:1865
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated bash Shift_JIS packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5.9 Extended Update Support.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", title: "Topic", }, { category: "general", text: "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nShift_JIS, also known as \"SJIS\", is a character encoding for the Japanese\nlanguage. This package provides bash support for the Shift_JIS encoding.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll users who require Shift_JIS encoding support with Bash built-in\nfunctions are advised to upgrade to these updated packages, which contain a\nbackported patch to correct this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2014:1865", url: "https://access.redhat.com/errata/RHSA-2014:1865", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/articles/1200223", url: "https://access.redhat.com/articles/1200223", }, { category: "external", summary: "1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1865.json", }, ], title: "Red Hat Security Advisory: bash Shift_JIS security update", tracking: { current_release_date: "2024-11-14T16:27:19+00:00", generator: { date: "2024-11-14T16:27:19+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.0", }, }, id: "RHSA-2014:1865", initial_release_date: "2014-11-17T18:11:13+00:00", revision_history: [ { date: "2014-11-17T18:11:13+00:00", number: "1", summary: "Initial version", }, { date: "2014-11-17T18:11:14+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-14T16:27:19+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "SJIS (v. 5.9.z Server)", product: { name: "SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_sjis:5", }, }, }, ], category: "product_family", name: "RHEL S-JIS Service", }, { branches: [ { category: "product_version", name: "bash-0:3.2-32.el5_9.3.sjis.1.ia64", product: { name: "bash-0:3.2-32.el5_9.3.sjis.1.ia64", product_id: "bash-0:3.2-32.el5_9.3.sjis.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=ia64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3.sjis.1?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "bash-0:3.2-32.el5_9.3.sjis.1.i386", product: { name: "bash-0:3.2-32.el5_9.3.sjis.1.i386", product_id: "bash-0:3.2-32.el5_9.3.sjis.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=i386", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3.sjis.1?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, { branches: [ { category: "product_version", name: "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", product: { name: "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", product_id: "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3.sjis.1?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "bash-0:3.2-32.el5_9.3.sjis.1.src", product: { name: "bash-0:3.2-32.el5_9.3.sjis.1.src", product_id: "bash-0:3.2-32.el5_9.3.sjis.1.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3.sjis.1?arch=src", }, }, }, ], category: "architecture", name: "src", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.sjis.1.i386 as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", }, product_reference: "bash-0:3.2-32.el5_9.3.sjis.1.i386", relates_to_product_reference: "5Server-SJIS-5.9.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.sjis.1.ia64 as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", }, product_reference: "bash-0:3.2-32.el5_9.3.sjis.1.ia64", relates_to_product_reference: "5Server-SJIS-5.9.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.sjis.1.src as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", }, product_reference: "bash-0:3.2-32.el5_9.3.sjis.1.src", relates_to_product_reference: "5Server-SJIS-5.9.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.sjis.1.x86_64 as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", }, product_reference: "bash-0:3.2-32.el5_9.3.sjis.1.x86_64", relates_to_product_reference: "5Server-SJIS-5.9.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386 as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", relates_to_product_reference: "5Server-SJIS-5.9.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64 as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", relates_to_product_reference: "5Server-SJIS-5.9.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64 as a component of SJIS (v. 5.9.z Server)", product_id: "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", relates_to_product_reference: "5Server-SJIS-5.9.z", }, ], }, vulnerabilities: [ { cve: "CVE-2014-7169", cwe: { id: "CWE-228", name: "Improper Handling of Syntactically Invalid Structure", }, discovery_date: "2014-09-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146319", }, ], notes: [ { category: "description", text: "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", title: "Vulnerability description", }, { category: "summary", text: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "RHBZ#1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "external", summary: "RHSB-shellshock", url: "https://access.redhat.com/security/vulnerabilities/shellshock", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7169", url: "https://www.cve.org/CVERecord?id=CVE-2014-7169", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-11-17T18:11:13+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1865", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2022-01-28T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7186", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, discovery_date: "2014-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146791", }, ], notes: [ { category: "description", text: "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", title: "Vulnerability description", }, { category: "summary", text: "bash: parser can allow out-of-bounds memory access while handling redir_stack", title: "Vulnerability summary", }, { category: "other", text: "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7186", }, { category: "external", summary: "RHBZ#1146791", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146791", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7186", url: "https://www.cve.org/CVERecord?id=CVE-2014-7186", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", }, ], release_date: "2014-09-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-11-17T18:11:13+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1865", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: parser can allow out-of-bounds memory access while handling redir_stack", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7187", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2014-09-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146804", }, ], notes: [ { category: "description", text: "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", title: "Vulnerability description", }, { category: "summary", text: "bash: off-by-one error in deeply nested flow control constructs", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "RHBZ#1146804", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146804", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7187", url: "https://www.cve.org/CVERecord?id=CVE-2014-7187", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", }, ], release_date: "2014-09-26T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-11-17T18:11:13+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1865", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.src", "5Server-SJIS-5.9.z:bash-0:3.2-32.el5_9.3.sjis.1.x86_64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.i386", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.ia64", "5Server-SJIS-5.9.z:bash-debuginfo-0:3.2-32.el5_9.3.sjis.1.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: off-by-one error in deeply nested flow control constructs", }, ], }
RHSA-2014:1311
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "[Updated September 30, 2014]\nThis advisory has been updated with information on restarting system\nservices after applying this update. No changes have been made to the\noriginal packages.\n\nUpdated bash packages that fix one security issue are now available for Red\nHat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise\nLinux 5.6 Long Life, Red Hat Enterprise Linux 5.9 Extended Update Support,\nRed Hat Enterprise Linux 6.2 Advanced Update Support, and Red Hat\nEnterprise Linux 6.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", title: "Topic", }, { category: "general", text: "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2014:1311", url: "https://access.redhat.com/errata/RHSA-2014:1311", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/articles/1200223", url: "https://access.redhat.com/articles/1200223", }, { category: "external", summary: "1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1311.json", }, ], title: "Red Hat Security Advisory: bash security update", tracking: { current_release_date: "2024-11-14T16:26:16+00:00", generator: { date: "2024-11-14T16:26:16+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.0", }, }, id: "RHSA-2014:1311", initial_release_date: "2014-09-26T17:58:08+00:00", revision_history: [ { date: "2014-09-26T17:58:08+00:00", number: "1", summary: "Initial version", }, { date: "2014-09-30T15:08:45+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-14T16:26:16+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product: { name: "Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.4::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product: { name: "Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.4::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server EUS (v. 6.4)", product: { name: "Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.4::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product: { name: "Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.4::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server AUS (v. 6.2)", product: { name: "Red Hat Enterprise Linux Server AUS (v. 6.2)", product_id: "6Server-6.2.AUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_mission_critical:6.2::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", product: { name: "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", product_id: "6Server-optional-6.2.AUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_mission_critical:6.2::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Long Life (v. 5.6 server)", product: { name: "Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_mission_critical:5.6", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux EUS (v. 5.9 server)", product: { name: "Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:5.9", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux AS (v. 4 ELS)", product: { name: "Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_els:4::as", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ES (v. 4 ELS)", product: { name: "Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_els:4::es", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "bash-0:4.1.2-15.el6_4.2.src", product: { name: "bash-0:4.1.2-15.el6_4.2.src", product_id: "bash-0:4.1.2-15.el6_4.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=src", }, }, }, { category: "product_version", name: "bash-0:4.1.2-9.el6_2.2.src", product: { name: "bash-0:4.1.2-9.el6_2.2.src", product_id: "bash-0:4.1.2-9.el6_2.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-9.el6_2.2?arch=src", }, }, }, { category: "product_version", name: "bash-0:3.2-24.el5_6.2.src", product: { name: "bash-0:3.2-24.el5_6.2.src", product_id: "bash-0:3.2-24.el5_6.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=src", }, }, }, { category: "product_version", name: "bash-0:3.2-32.el5_9.3.src", product: { name: "bash-0:3.2-32.el5_9.3.src", product_id: "bash-0:3.2-32.el5_9.3.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=src", }, }, }, { category: "product_version", name: "bash-0:3.0-27.el4.4.src", product: { name: "bash-0:3.0-27.el4.4.src", product_id: "bash-0:3.0-27.el4.4.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", product: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", product_id: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=s390x", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_4.2.s390x", product: { name: "bash-doc-0:4.1.2-15.el6_4.2.s390x", product_id: "bash-doc-0:4.1.2-15.el6_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=s390x", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_4.2.s390x", product: { name: "bash-0:4.1.2-15.el6_4.2.s390x", product_id: "bash-0:4.1.2-15.el6_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=s390x", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.s390x", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.s390x", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=s390x", }, }, }, { category: "product_version", name: "bash-0:3.2-32.el5_9.3.s390x", product: { name: "bash-0:3.2-32.el5_9.3.s390x", product_id: "bash-0:3.2-32.el5_9.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", product: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", product_id: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=i686", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_4.2.i686", product: { name: "bash-doc-0:4.1.2-15.el6_4.2.i686", product_id: "bash-doc-0:4.1.2-15.el6_4.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=i686", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_4.2.i686", product: { name: "bash-0:4.1.2-15.el6_4.2.i686", product_id: "bash-0:4.1.2-15.el6_4.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", product: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", product_id: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", product: { name: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", product_id: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_4.2.x86_64", product: { name: "bash-0:4.1.2-15.el6_4.2.x86_64", product_id: "bash-0:4.1.2-15.el6_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", product: { name: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", product_id: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-9.el6_2.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-9.el6_2.2.x86_64", product: { name: "bash-doc-0:4.1.2-9.el6_2.2.x86_64", product_id: "bash-doc-0:4.1.2-9.el6_2.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-9.el6_2.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:4.1.2-9.el6_2.2.x86_64", product: { name: "bash-0:4.1.2-9.el6_2.2.x86_64", product_id: "bash-0:4.1.2-9.el6_2.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-9.el6_2.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:3.2-24.el5_6.2.x86_64", product: { name: "bash-0:3.2-24.el5_6.2.x86_64", product_id: "bash-0:3.2-24.el5_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", product: { name: "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", product_id: "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-24.el5_6.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:3.2-32.el5_9.3.x86_64", product: { name: "bash-0:3.2-32.el5_9.3.x86_64", product_id: "bash-0:3.2-32.el5_9.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.0-27.el4.4.x86_64", product: { name: "bash-debuginfo-0:3.0-27.el4.4.x86_64", product_id: "bash-debuginfo-0:3.0-27.el4.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.0-27.el4.4?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:3.0-27.el4.4.x86_64", product: { name: "bash-0:3.0-27.el4.4.x86_64", product_id: "bash-0:3.0-27.el4.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", product: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", product_id: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", product: { name: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", product_id: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_4.2.ppc64", product: { name: "bash-0:4.1.2-15.el6_4.2.ppc64", product_id: "bash-0:4.1.2-15.el6_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "bash-0:3.2-24.el5_6.2.ia64", product: { name: "bash-0:3.2-24.el5_6.2.ia64", product_id: "bash-0:3.2-24.el5_6.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=ia64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-24.el5_6.2.ia64", product: { name: "bash-debuginfo-0:3.2-24.el5_6.2.ia64", product_id: "bash-debuginfo-0:3.2-24.el5_6.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-24.el5_6.2?arch=ia64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.ia64", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.ia64", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=ia64", }, }, }, { category: "product_version", name: "bash-0:3.2-32.el5_9.3.ia64", product: { name: "bash-0:3.2-32.el5_9.3.ia64", product_id: "bash-0:3.2-32.el5_9.3.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=ia64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.0-27.el4.4.ia64", product: { name: "bash-debuginfo-0:3.0-27.el4.4.ia64", product_id: "bash-debuginfo-0:3.0-27.el4.4.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.0-27.el4.4?arch=ia64", }, }, }, { category: "product_version", name: "bash-0:3.0-27.el4.4.ia64", product: { name: "bash-0:3.0-27.el4.4.ia64", product_id: "bash-0:3.0-27.el4.4.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "bash-0:3.2-24.el5_6.2.i386", product: { name: "bash-0:3.2-24.el5_6.2.i386", product_id: "bash-0:3.2-24.el5_6.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=i386", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-24.el5_6.2.i386", product: { name: "bash-debuginfo-0:3.2-24.el5_6.2.i386", product_id: "bash-debuginfo-0:3.2-24.el5_6.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-24.el5_6.2?arch=i386", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.i386", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.i386", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=i386", }, }, }, { category: "product_version", name: "bash-0:3.2-32.el5_9.3.i386", product: { name: "bash-0:3.2-32.el5_9.3.i386", product_id: "bash-0:3.2-32.el5_9.3.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=i386", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.0-27.el4.4.i386", product: { name: "bash-debuginfo-0:3.0-27.el4.4.i386", product_id: "bash-debuginfo-0:3.0-27.el4.4.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.0-27.el4.4?arch=i386", }, }, }, { category: "product_version", name: "bash-0:3.0-27.el4.4.i386", product: { name: "bash-0:3.0-27.el4.4.i386", product_id: "bash-0:3.0-27.el4.4.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.ppc", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.ppc", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=ppc", }, }, }, { category: "product_version", name: "bash-0:3.2-32.el5_9.3.ppc", product: { name: "bash-0:3.2-32.el5_9.3.ppc", product_id: "bash-0:3.2-32.el5_9.3.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-0:3.0-27.el4.4.i386", }, product_reference: "bash-0:3.0-27.el4.4.i386", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-0:3.0-27.el4.4.ia64", }, product_reference: "bash-0:3.0-27.el4.4.ia64", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.src as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-0:3.0-27.el4.4.src", }, product_reference: "bash-0:3.0-27.el4.4.src", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", }, product_reference: "bash-0:3.0-27.el4.4.x86_64", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", }, product_reference: "bash-debuginfo-0:3.0-27.el4.4.i386", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", }, product_reference: "bash-debuginfo-0:3.0-27.el4.4.ia64", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", }, product_reference: "bash-debuginfo-0:3.0-27.el4.4.x86_64", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-0:3.0-27.el4.4.i386", }, product_reference: "bash-0:3.0-27.el4.4.i386", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-0:3.0-27.el4.4.ia64", }, product_reference: "bash-0:3.0-27.el4.4.ia64", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.src as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-0:3.0-27.el4.4.src", }, product_reference: "bash-0:3.0-27.el4.4.src", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", }, product_reference: "bash-0:3.0-27.el4.4.x86_64", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", }, product_reference: "bash-debuginfo-0:3.0-27.el4.4.i386", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", }, product_reference: "bash-debuginfo-0:3.0-27.el4.4.ia64", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", }, product_reference: "bash-debuginfo-0:3.0-27.el4.4.x86_64", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-24.el5_6.2.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", }, product_reference: "bash-0:3.2-24.el5_6.2.i386", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-24.el5_6.2.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", }, product_reference: "bash-0:3.2-24.el5_6.2.ia64", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-24.el5_6.2.src as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", }, product_reference: "bash-0:3.2-24.el5_6.2.src", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-24.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", }, product_reference: "bash-0:3.2-24.el5_6.2.x86_64", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-24.el5_6.2.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", }, product_reference: "bash-debuginfo-0:3.2-24.el5_6.2.i386", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-24.el5_6.2.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", }, product_reference: "bash-debuginfo-0:3.2-24.el5_6.2.ia64", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-24.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", }, product_reference: "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", }, product_reference: "bash-0:3.2-32.el5_9.3.i386", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", }, product_reference: "bash-0:3.2-32.el5_9.3.ia64", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", }, product_reference: "bash-0:3.2-32.el5_9.3.ppc", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", }, product_reference: "bash-0:3.2-32.el5_9.3.s390x", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.src as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", }, product_reference: "bash-0:3.2-32.el5_9.3.src", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", }, product_reference: "bash-0:3.2-32.el5_9.3.x86_64", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.i386", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.ia64", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.ppc", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.s390x", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", }, product_reference: "bash-0:4.1.2-15.el6_4.2.src", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", }, product_reference: "bash-0:4.1.2-15.el6_4.2.src", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-9.el6_2.2.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", product_id: "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", }, product_reference: "bash-0:4.1.2-9.el6_2.2.src", relates_to_product_reference: "6Server-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", product_id: "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", }, product_reference: "bash-0:4.1.2-9.el6_2.2.x86_64", relates_to_product_reference: "6Server-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", product_id: "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", relates_to_product_reference: "6Server-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", product_id: "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-9.el6_2.2.x86_64", relates_to_product_reference: "6Server-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", }, product_reference: "bash-0:4.1.2-15.el6_4.2.src", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-9.el6_2.2.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", product_id: "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", }, product_reference: "bash-0:4.1.2-9.el6_2.2.src", relates_to_product_reference: "6Server-optional-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", product_id: "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", }, product_reference: "bash-0:4.1.2-9.el6_2.2.x86_64", relates_to_product_reference: "6Server-optional-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", product_id: "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", relates_to_product_reference: "6Server-optional-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", product_id: "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-9.el6_2.2.x86_64", relates_to_product_reference: "6Server-optional-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", }, product_reference: "bash-0:4.1.2-15.el6_4.2.src", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6Server-optional-6.4.EUS", }, ], }, vulnerabilities: [ { cve: "CVE-2014-7169", cwe: { id: "CWE-228", name: "Improper Handling of Syntactically Invalid Structure", }, discovery_date: "2014-09-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146319", }, ], notes: [ { category: "description", text: "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", title: "Vulnerability description", }, { category: "summary", text: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "RHBZ#1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "external", summary: "RHSB-shellshock", url: "https://access.redhat.com/security/vulnerabilities/shellshock", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7169", url: "https://www.cve.org/CVERecord?id=CVE-2014-7169", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T17:58:08+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1311", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2022-01-28T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7186", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, discovery_date: "2014-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146791", }, ], notes: [ { category: "description", text: "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", title: "Vulnerability description", }, { category: "summary", text: "bash: parser can allow out-of-bounds memory access while handling redir_stack", title: "Vulnerability summary", }, { category: "other", text: "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7186", }, { category: "external", summary: "RHBZ#1146791", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146791", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7186", url: "https://www.cve.org/CVERecord?id=CVE-2014-7186", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", }, ], release_date: "2014-09-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T17:58:08+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1311", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: parser can allow out-of-bounds memory access while handling redir_stack", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7187", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2014-09-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146804", }, ], notes: [ { category: "description", text: "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", title: "Vulnerability description", }, { category: "summary", text: "bash: off-by-one error in deeply nested flow control constructs", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "RHBZ#1146804", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146804", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7187", url: "https://www.cve.org/CVERecord?id=CVE-2014-7187", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", }, ], release_date: "2014-09-26T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T17:58:08+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1311", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: off-by-one error in deeply nested flow control constructs", }, ], }
rhsa-2014:1306
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "[Updated September 30, 2014]\nThis advisory has been updated with information on restarting system\nservices after applying this update. No changes have been made to the\noriginal packages.\n\nUpdated bash packages that fix one security issue are now available for Red\nHat Enterprise Linux 5, 6, and 7.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", title: "Topic", }, { category: "general", text: "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2014:1306", url: "https://access.redhat.com/errata/RHSA-2014:1306", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/articles/1200223", url: "https://access.redhat.com/articles/1200223", }, { category: "external", summary: "1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1306.json", }, ], title: "Red Hat Security Advisory: bash security update", tracking: { current_release_date: "2025-03-19T13:58:19+00:00", generator: { date: "2025-03-19T13:58:19+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2014:1306", initial_release_date: "2014-09-26T01:46:36+00:00", revision_history: [ { date: "2014-09-26T01:46:36+00:00", number: "1", summary: "Initial version", }, { date: "2014-09-30T16:02:45+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-19T13:58:19+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Desktop (v. 6)", product: { name: "Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop Optional (v. 6)", product: { name: "Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux HPC Node (v. 6)", product: { name: "Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux HPC Node Optional (v. 6)", product: { name: "Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 6)", product: { name: "Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 6)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 6)", product: { name: "Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 6)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Client (v. 7)", product: { name: "Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Client Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop (v. 5 client)", product: { name: "Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux (v. 5 server)", product: { name: "Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "bash-0:4.1.2-15.el6_5.2.src", product: { name: "bash-0:4.1.2-15.el6_5.2.src", product_id: "bash-0:4.1.2-15.el6_5.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=src", }, }, }, { category: "product_version", name: "bash-0:4.2.45-5.el7_0.4.src", product: { name: "bash-0:4.2.45-5.el7_0.4.src", product_id: "bash-0:4.2.45-5.el7_0.4.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=src", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.4.src", product: { name: "bash-0:3.2-33.el5_11.4.src", product_id: "bash-0:3.2-33.el5_11.4.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", product: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", product_id: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=i686", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_5.2.i686", product: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686", product_id: "bash-doc-0:4.1.2-15.el6_5.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=i686", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_5.2.i686", product: { name: "bash-0:4.1.2-15.el6_5.2.i686", product_id: "bash-0:4.1.2-15.el6_5.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", product: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", product_id: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", product: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", product_id: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_5.2.x86_64", product: { name: "bash-0:4.1.2-15.el6_5.2.x86_64", product_id: "bash-0:4.1.2-15.el6_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", product: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", product_id: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.2.45-5.el7_0.4?arch=x86_64", }, }, }, { category: "product_version", name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", product: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", product_id: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.2.45-5.el7_0.4?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:4.2.45-5.el7_0.4.x86_64", product: { name: "bash-0:4.2.45-5.el7_0.4.x86_64", product_id: "bash-0:4.2.45-5.el7_0.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", product: { name: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", product_id: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.4.x86_64", product: { name: "bash-0:3.2-33.el5_11.4.x86_64", product_id: "bash-0:3.2-33.el5_11.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", product: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", product_id: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=s390x", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_5.2.s390x", product: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x", product_id: "bash-doc-0:4.1.2-15.el6_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=s390x", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_5.2.s390x", product: { name: "bash-0:4.1.2-15.el6_5.2.s390x", product_id: "bash-0:4.1.2-15.el6_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=s390x", }, }, }, { category: "product_version", name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", product: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", product_id: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.2.45-5.el7_0.4?arch=s390x", }, }, }, { category: "product_version", name: "bash-doc-0:4.2.45-5.el7_0.4.s390x", product: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x", product_id: "bash-doc-0:4.2.45-5.el7_0.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.2.45-5.el7_0.4?arch=s390x", }, }, }, { category: "product_version", name: "bash-0:4.2.45-5.el7_0.4.s390x", product: { name: "bash-0:4.2.45-5.el7_0.4.s390x", product_id: "bash-0:4.2.45-5.el7_0.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=s390x", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.4.s390x", product: { name: "bash-debuginfo-0:3.2-33.el5_11.4.s390x", product_id: "bash-debuginfo-0:3.2-33.el5_11.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=s390x", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.4.s390x", product: { name: "bash-0:3.2-33.el5_11.4.s390x", product_id: "bash-0:3.2-33.el5_11.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", product: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", product_id: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=ppc64", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", product: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", product_id: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=ppc64", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_5.2.ppc64", product: { name: "bash-0:4.1.2-15.el6_5.2.ppc64", product_id: "bash-0:4.1.2-15.el6_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=ppc64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", product: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", product_id: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.2.45-5.el7_0.4?arch=ppc64", }, }, }, { category: "product_version", name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", product: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", product_id: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.2.45-5.el7_0.4?arch=ppc64", }, }, }, { category: "product_version", name: "bash-0:4.2.45-5.el7_0.4.ppc64", product: { name: "bash-0:4.2.45-5.el7_0.4.ppc64", product_id: "bash-0:4.2.45-5.el7_0.4.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.4.i386", product: { name: "bash-debuginfo-0:3.2-33.el5_11.4.i386", product_id: "bash-debuginfo-0:3.2-33.el5_11.4.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=i386", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.4.i386", product: { name: "bash-0:3.2-33.el5_11.4.i386", product_id: "bash-0:3.2-33.el5_11.4.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.4.ia64", product: { name: "bash-debuginfo-0:3.2-33.el5_11.4.ia64", product_id: "bash-debuginfo-0:3.2-33.el5_11.4.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=ia64", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.4.ia64", product: { name: "bash-0:3.2-33.el5_11.4.ia64", product_id: "bash-0:3.2-33.el5_11.4.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.4.ppc", product: { name: "bash-debuginfo-0:3.2-33.el5_11.4.ppc", product_id: "bash-debuginfo-0:3.2-33.el5_11.4.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=ppc", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.4.ppc", product: { name: "bash-0:3.2-33.el5_11.4.ppc", product_id: "bash-0:3.2-33.el5_11.4.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", }, product_reference: "bash-0:3.2-33.el5_11.4.i386", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", }, product_reference: "bash-0:3.2-33.el5_11.4.ia64", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", }, product_reference: "bash-0:3.2-33.el5_11.4.ppc", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", }, product_reference: "bash-0:3.2-33.el5_11.4.s390x", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", }, product_reference: "bash-0:3.2-33.el5_11.4.src", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", }, product_reference: "bash-0:3.2-33.el5_11.4.x86_64", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.i386", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.ia64", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.ppc", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.s390x", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", }, product_reference: "bash-0:3.2-33.el5_11.4.i386", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", }, product_reference: "bash-0:3.2-33.el5_11.4.ia64", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", }, product_reference: "bash-0:3.2-33.el5_11.4.ppc", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", }, product_reference: "bash-0:3.2-33.el5_11.4.s390x", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.src as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", }, product_reference: "bash-0:3.2-33.el5_11.4.src", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", }, product_reference: "bash-0:3.2-33.el5_11.4.x86_64", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.i386", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.ia64", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.ppc", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.s390x", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, ], }, vulnerabilities: [ { cve: "CVE-2014-7169", cwe: { id: "CWE-228", name: "Improper Handling of Syntactically Invalid Structure", }, discovery_date: "2014-09-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146319", }, ], notes: [ { category: "description", text: "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", title: "Vulnerability description", }, { category: "summary", text: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "RHBZ#1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "external", summary: "RHSB-shellshock", url: "https://access.redhat.com/security/vulnerabilities/shellshock", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7169", url: "https://www.cve.org/CVERecord?id=CVE-2014-7169", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T01:46:36+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1306", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2022-01-28T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7186", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, discovery_date: "2014-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146791", }, ], notes: [ { category: "description", text: "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", title: "Vulnerability description", }, { category: "summary", text: "bash: parser can allow out-of-bounds memory access while handling redir_stack", title: "Vulnerability summary", }, { category: "other", text: "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7186", }, { category: "external", summary: "RHBZ#1146791", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146791", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7186", url: "https://www.cve.org/CVERecord?id=CVE-2014-7186", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", }, ], release_date: "2014-09-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T01:46:36+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1306", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: parser can allow out-of-bounds memory access while handling redir_stack", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7187", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2014-09-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146804", }, ], notes: [ { category: "description", text: "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", title: "Vulnerability description", }, { category: "summary", text: "bash: off-by-one error in deeply nested flow control constructs", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "RHBZ#1146804", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146804", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7187", url: "https://www.cve.org/CVERecord?id=CVE-2014-7187", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", }, ], release_date: "2014-09-26T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T01:46:36+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1306", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: off-by-one error in deeply nested flow control constructs", }, ], }
rhsa-2014:1311
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "[Updated September 30, 2014]\nThis advisory has been updated with information on restarting system\nservices after applying this update. No changes have been made to the\noriginal packages.\n\nUpdated bash packages that fix one security issue are now available for Red\nHat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise\nLinux 5.6 Long Life, Red Hat Enterprise Linux 5.9 Extended Update Support,\nRed Hat Enterprise Linux 6.2 Advanced Update Support, and Red Hat\nEnterprise Linux 6.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", title: "Topic", }, { category: "general", text: "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2014:1311", url: "https://access.redhat.com/errata/RHSA-2014:1311", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/articles/1200223", url: "https://access.redhat.com/articles/1200223", }, { category: "external", summary: "1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1311.json", }, ], title: "Red Hat Security Advisory: bash security update", tracking: { current_release_date: "2024-11-14T16:26:16+00:00", generator: { date: "2024-11-14T16:26:16+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.0", }, }, id: "RHSA-2014:1311", initial_release_date: "2014-09-26T17:58:08+00:00", revision_history: [ { date: "2014-09-26T17:58:08+00:00", number: "1", summary: "Initial version", }, { date: "2014-09-30T15:08:45+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-14T16:26:16+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product: { name: "Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.4::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product: { name: "Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.4::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server EUS (v. 6.4)", product: { name: "Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.4::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product: { name: "Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:6.4::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server AUS (v. 6.2)", product: { name: "Red Hat Enterprise Linux Server AUS (v. 6.2)", product_id: "6Server-6.2.AUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_mission_critical:6.2::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", product: { name: "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", product_id: "6Server-optional-6.2.AUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_mission_critical:6.2::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Long Life (v. 5.6 server)", product: { name: "Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_mission_critical:5.6", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux EUS (v. 5.9 server)", product: { name: "Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:5.9", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux AS (v. 4 ELS)", product: { name: "Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_els:4::as", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ES (v. 4 ELS)", product: { name: "Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_els:4::es", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "bash-0:4.1.2-15.el6_4.2.src", product: { name: "bash-0:4.1.2-15.el6_4.2.src", product_id: "bash-0:4.1.2-15.el6_4.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=src", }, }, }, { category: "product_version", name: "bash-0:4.1.2-9.el6_2.2.src", product: { name: "bash-0:4.1.2-9.el6_2.2.src", product_id: "bash-0:4.1.2-9.el6_2.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-9.el6_2.2?arch=src", }, }, }, { category: "product_version", name: "bash-0:3.2-24.el5_6.2.src", product: { name: "bash-0:3.2-24.el5_6.2.src", product_id: "bash-0:3.2-24.el5_6.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=src", }, }, }, { category: "product_version", name: "bash-0:3.2-32.el5_9.3.src", product: { name: "bash-0:3.2-32.el5_9.3.src", product_id: "bash-0:3.2-32.el5_9.3.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=src", }, }, }, { category: "product_version", name: "bash-0:3.0-27.el4.4.src", product: { name: "bash-0:3.0-27.el4.4.src", product_id: "bash-0:3.0-27.el4.4.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", product: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", product_id: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=s390x", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_4.2.s390x", product: { name: "bash-doc-0:4.1.2-15.el6_4.2.s390x", product_id: "bash-doc-0:4.1.2-15.el6_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=s390x", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_4.2.s390x", product: { name: "bash-0:4.1.2-15.el6_4.2.s390x", product_id: "bash-0:4.1.2-15.el6_4.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=s390x", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.s390x", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.s390x", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=s390x", }, }, }, { category: "product_version", name: "bash-0:3.2-32.el5_9.3.s390x", product: { name: "bash-0:3.2-32.el5_9.3.s390x", product_id: "bash-0:3.2-32.el5_9.3.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", product: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", product_id: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=i686", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_4.2.i686", product: { name: "bash-doc-0:4.1.2-15.el6_4.2.i686", product_id: "bash-doc-0:4.1.2-15.el6_4.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=i686", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_4.2.i686", product: { name: "bash-0:4.1.2-15.el6_4.2.i686", product_id: "bash-0:4.1.2-15.el6_4.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", product: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", product_id: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", product: { name: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", product_id: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_4.2.x86_64", product: { name: "bash-0:4.1.2-15.el6_4.2.x86_64", product_id: "bash-0:4.1.2-15.el6_4.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", product: { name: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", product_id: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-9.el6_2.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-9.el6_2.2.x86_64", product: { name: "bash-doc-0:4.1.2-9.el6_2.2.x86_64", product_id: "bash-doc-0:4.1.2-9.el6_2.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-9.el6_2.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:4.1.2-9.el6_2.2.x86_64", product: { name: "bash-0:4.1.2-9.el6_2.2.x86_64", product_id: "bash-0:4.1.2-9.el6_2.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-9.el6_2.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:3.2-24.el5_6.2.x86_64", product: { name: "bash-0:3.2-24.el5_6.2.x86_64", product_id: "bash-0:3.2-24.el5_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", product: { name: "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", product_id: "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-24.el5_6.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:3.2-32.el5_9.3.x86_64", product: { name: "bash-0:3.2-32.el5_9.3.x86_64", product_id: "bash-0:3.2-32.el5_9.3.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.0-27.el4.4.x86_64", product: { name: "bash-debuginfo-0:3.0-27.el4.4.x86_64", product_id: "bash-debuginfo-0:3.0-27.el4.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.0-27.el4.4?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:3.0-27.el4.4.x86_64", product: { name: "bash-0:3.0-27.el4.4.x86_64", product_id: "bash-0:3.0-27.el4.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", product: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", product_id: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", product: { name: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", product_id: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.2?arch=ppc64", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_4.2.ppc64", product: { name: "bash-0:4.1.2-15.el6_4.2.ppc64", product_id: "bash-0:4.1.2-15.el6_4.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_4.2?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "bash-0:3.2-24.el5_6.2.ia64", product: { name: "bash-0:3.2-24.el5_6.2.ia64", product_id: "bash-0:3.2-24.el5_6.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=ia64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-24.el5_6.2.ia64", product: { name: "bash-debuginfo-0:3.2-24.el5_6.2.ia64", product_id: "bash-debuginfo-0:3.2-24.el5_6.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-24.el5_6.2?arch=ia64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.ia64", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.ia64", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=ia64", }, }, }, { category: "product_version", name: "bash-0:3.2-32.el5_9.3.ia64", product: { name: "bash-0:3.2-32.el5_9.3.ia64", product_id: "bash-0:3.2-32.el5_9.3.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=ia64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.0-27.el4.4.ia64", product: { name: "bash-debuginfo-0:3.0-27.el4.4.ia64", product_id: "bash-debuginfo-0:3.0-27.el4.4.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.0-27.el4.4?arch=ia64", }, }, }, { category: "product_version", name: "bash-0:3.0-27.el4.4.ia64", product: { name: "bash-0:3.0-27.el4.4.ia64", product_id: "bash-0:3.0-27.el4.4.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "bash-0:3.2-24.el5_6.2.i386", product: { name: "bash-0:3.2-24.el5_6.2.i386", product_id: "bash-0:3.2-24.el5_6.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-24.el5_6.2?arch=i386", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-24.el5_6.2.i386", product: { name: "bash-debuginfo-0:3.2-24.el5_6.2.i386", product_id: "bash-debuginfo-0:3.2-24.el5_6.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-24.el5_6.2?arch=i386", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.i386", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.i386", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=i386", }, }, }, { category: "product_version", name: "bash-0:3.2-32.el5_9.3.i386", product: { name: "bash-0:3.2-32.el5_9.3.i386", product_id: "bash-0:3.2-32.el5_9.3.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=i386", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.0-27.el4.4.i386", product: { name: "bash-debuginfo-0:3.0-27.el4.4.i386", product_id: "bash-debuginfo-0:3.0-27.el4.4.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.0-27.el4.4?arch=i386", }, }, }, { category: "product_version", name: "bash-0:3.0-27.el4.4.i386", product: { name: "bash-0:3.0-27.el4.4.i386", product_id: "bash-0:3.0-27.el4.4.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.0-27.el4.4?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:3.2-32.el5_9.3.ppc", product: { name: "bash-debuginfo-0:3.2-32.el5_9.3.ppc", product_id: "bash-debuginfo-0:3.2-32.el5_9.3.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.3?arch=ppc", }, }, }, { category: "product_version", name: "bash-0:3.2-32.el5_9.3.ppc", product: { name: "bash-0:3.2-32.el5_9.3.ppc", product_id: "bash-0:3.2-32.el5_9.3.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-32.el5_9.3?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-0:3.0-27.el4.4.i386", }, product_reference: "bash-0:3.0-27.el4.4.i386", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-0:3.0-27.el4.4.ia64", }, product_reference: "bash-0:3.0-27.el4.4.ia64", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.src as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-0:3.0-27.el4.4.src", }, product_reference: "bash-0:3.0-27.el4.4.src", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", }, product_reference: "bash-0:3.0-27.el4.4.x86_64", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", }, product_reference: "bash-debuginfo-0:3.0-27.el4.4.i386", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", }, product_reference: "bash-debuginfo-0:3.0-27.el4.4.ia64", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)", product_id: "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", }, product_reference: "bash-debuginfo-0:3.0-27.el4.4.x86_64", relates_to_product_reference: "4AS-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-0:3.0-27.el4.4.i386", }, product_reference: "bash-0:3.0-27.el4.4.i386", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-0:3.0-27.el4.4.ia64", }, product_reference: "bash-0:3.0-27.el4.4.ia64", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.src as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-0:3.0-27.el4.4.src", }, product_reference: "bash-0:3.0-27.el4.4.src", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", }, product_reference: "bash-0:3.0-27.el4.4.x86_64", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.0-27.el4.4.i386 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", }, product_reference: "bash-debuginfo-0:3.0-27.el4.4.i386", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.0-27.el4.4.ia64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", }, product_reference: "bash-debuginfo-0:3.0-27.el4.4.ia64", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.0-27.el4.4.x86_64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)", product_id: "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", }, product_reference: "bash-debuginfo-0:3.0-27.el4.4.x86_64", relates_to_product_reference: "4ES-ELS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-24.el5_6.2.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", }, product_reference: "bash-0:3.2-24.el5_6.2.i386", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-24.el5_6.2.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", }, product_reference: "bash-0:3.2-24.el5_6.2.ia64", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-24.el5_6.2.src as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", }, product_reference: "bash-0:3.2-24.el5_6.2.src", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-24.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", }, product_reference: "bash-0:3.2-24.el5_6.2.x86_64", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-24.el5_6.2.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", }, product_reference: "bash-debuginfo-0:3.2-24.el5_6.2.i386", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-24.el5_6.2.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", }, product_reference: "bash-debuginfo-0:3.2-24.el5_6.2.ia64", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-24.el5_6.2.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", product_id: "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", }, product_reference: "bash-debuginfo-0:3.2-24.el5_6.2.x86_64", relates_to_product_reference: "5Server-5.6.LL", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", }, product_reference: "bash-0:3.2-32.el5_9.3.i386", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", }, product_reference: "bash-0:3.2-32.el5_9.3.ia64", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", }, product_reference: "bash-0:3.2-32.el5_9.3.ppc", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", }, product_reference: "bash-0:3.2-32.el5_9.3.s390x", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.src as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", }, product_reference: "bash-0:3.2-32.el5_9.3.src", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-32.el5_9.3.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", }, product_reference: "bash-0:3.2-32.el5_9.3.x86_64", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.i386", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.ia64", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.ppc", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.s390x", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-32.el5_9.3.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)", product_id: "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", }, product_reference: "bash-debuginfo-0:3.2-32.el5_9.3.x86_64", relates_to_product_reference: "5Server-5.9.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", }, product_reference: "bash-0:4.1.2-15.el6_4.2.src", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)", product_id: "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6ComputeNode-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", }, product_reference: "bash-0:4.1.2-15.el6_4.2.src", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)", product_id: "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-9.el6_2.2.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", product_id: "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", }, product_reference: "bash-0:4.1.2-9.el6_2.2.src", relates_to_product_reference: "6Server-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", product_id: "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", }, product_reference: "bash-0:4.1.2-9.el6_2.2.x86_64", relates_to_product_reference: "6Server-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", product_id: "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", relates_to_product_reference: "6Server-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", product_id: "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-9.el6_2.2.x86_64", relates_to_product_reference: "6Server-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", }, product_reference: "bash-0:4.1.2-15.el6_4.2.src", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)", product_id: "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6Server-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-9.el6_2.2.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", product_id: "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", }, product_reference: "bash-0:4.1.2-9.el6_2.2.src", relates_to_product_reference: "6Server-optional-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", product_id: "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", }, product_reference: "bash-0:4.1.2-9.el6_2.2.x86_64", relates_to_product_reference: "6Server-optional-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", product_id: "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", relates_to_product_reference: "6Server-optional-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-9.el6_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", product_id: "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-9.el6_2.2.x86_64", relates_to_product_reference: "6Server-optional-6.2.AUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", }, product_reference: "bash-0:4.1.2-15.el6_4.2.src", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.i686", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.ppc64", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.s390x", relates_to_product_reference: "6Server-optional-6.4.EUS", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_4.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)", product_id: "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_4.2.x86_64", relates_to_product_reference: "6Server-optional-6.4.EUS", }, ], }, vulnerabilities: [ { cve: "CVE-2014-7169", cwe: { id: "CWE-228", name: "Improper Handling of Syntactically Invalid Structure", }, discovery_date: "2014-09-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146319", }, ], notes: [ { category: "description", text: "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", title: "Vulnerability description", }, { category: "summary", text: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "RHBZ#1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "external", summary: "RHSB-shellshock", url: "https://access.redhat.com/security/vulnerabilities/shellshock", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7169", url: "https://www.cve.org/CVERecord?id=CVE-2014-7169", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T17:58:08+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1311", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2022-01-28T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7186", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, discovery_date: "2014-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146791", }, ], notes: [ { category: "description", text: "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", title: "Vulnerability description", }, { category: "summary", text: "bash: parser can allow out-of-bounds memory access while handling redir_stack", title: "Vulnerability summary", }, { category: "other", text: "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7186", }, { category: "external", summary: "RHBZ#1146791", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146791", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7186", url: "https://www.cve.org/CVERecord?id=CVE-2014-7186", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", }, ], release_date: "2014-09-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T17:58:08+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1311", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: parser can allow out-of-bounds memory access while handling redir_stack", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7187", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2014-09-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146804", }, ], notes: [ { category: "description", text: "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", title: "Vulnerability description", }, { category: "summary", text: "bash: off-by-one error in deeply nested flow control constructs", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "RHBZ#1146804", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146804", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7187", url: "https://www.cve.org/CVERecord?id=CVE-2014-7187", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", }, ], release_date: "2014-09-26T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T17:58:08+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1311", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "4AS-ELS:bash-0:3.0-27.el4.4.i386", "4AS-ELS:bash-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-0:3.0-27.el4.4.src", "4AS-ELS:bash-0:3.0-27.el4.4.x86_64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4AS-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-0:3.0-27.el4.4.i386", "4ES-ELS:bash-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-0:3.0-27.el4.4.src", "4ES-ELS:bash-0:3.0-27.el4.4.x86_64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.i386", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.ia64", "4ES-ELS:bash-debuginfo-0:3.0-27.el4.4.x86_64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.src", "5Server-5.6.LL:bash-0:3.2-24.el5_6.2.x86_64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.i386", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.ia64", "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.2.x86_64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.src", "5Server-5.9.EUS:bash-0:3.2-32.el5_9.3.x86_64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.i386", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ia64", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.ppc", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.s390x", "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.3.x86_64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.src", "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.2.x86_64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.src", "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.2.x86_64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.i686", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.ppc64", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.s390x", "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: off-by-one error in deeply nested flow control constructs", }, ], }
RHSA-2014:1312
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "[Updated September 30, 2014]\nThis advisory has been updated with information on restarting system\nservices after applying this update. No changes have been made to the\noriginal packages.\n\nUpdated bash Shift_JIS packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", title: "Topic", }, { category: "general", text: "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nShift_JIS, also known as \"SJIS\", is a character encoding for the Japanese\nlanguage. This package provides bash support for the Shift_JIS encoding.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll users who require Shift_JIS encoding support with Bash built-in\nfunctions are advised to upgrade to these updated packages, which contain a\nbackported patch to correct this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2014:1312", url: "https://access.redhat.com/errata/RHSA-2014:1312", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/articles/1200223", url: "https://access.redhat.com/articles/1200223", }, { category: "external", summary: "1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1312.json", }, ], title: "Red Hat Security Advisory: bash Shift_JIS security update", tracking: { current_release_date: "2024-11-14T16:26:22+00:00", generator: { date: "2024-11-14T16:26:22+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.0", }, }, id: "RHSA-2014:1312", initial_release_date: "2014-09-26T21:28:16+00:00", revision_history: [ { date: "2014-09-26T21:28:16+00:00", number: "1", summary: "Initial version", }, { date: "2014-09-30T15:08:43+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-14T16:26:22+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "S-JIS for Red Hat Enteprise Linux 6 Server", product: { name: "S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_sjis:6", }, }, }, { category: "product_name", name: "S-JIS for Red Hat Enteprise Linux 5 Server", product: { name: "S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z", product_identification_helper: { cpe: "cpe:/a:redhat:rhel_sjis:5", }, }, }, ], category: "product_family", name: "RHEL S-JIS Service", }, { branches: [ { category: "product_version", name: "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", product: { name: "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", product_id: "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1.sjis.2?arch=i686", }, }, }, { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", product: { name: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", product_id: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.1.sjis.2?arch=i686", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", product: { name: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", product_id: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.1.sjis.2?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product: { name: "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product_id: "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1.sjis.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product: { name: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product_id: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.1.sjis.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product: { name: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product_id: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.1.sjis.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", product: { name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", product_id: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.1.sjis.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", product: { name: "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", product_id: "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "bash-0:4.1.2-15.el6_5.1.sjis.2.src", product: { name: "bash-0:4.1.2-15.el6_5.1.sjis.2.src", product_id: "bash-0:4.1.2-15.el6_5.1.sjis.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1.sjis.2?arch=src", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.1.sjis.2.src", product: { name: "bash-0:3.2-33.el5_11.1.sjis.2.src", product_id: "bash-0:3.2-33.el5_11.1.sjis.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", product: { name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", product_id: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.1.sjis.2?arch=ia64", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.1.sjis.2.ia64", product: { name: "bash-0:3.2-33.el5_11.1.sjis.2.ia64", product_id: "bash-0:3.2-33.el5_11.1.sjis.2.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", product: { name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", product_id: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.1.sjis.2?arch=i386", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.1.sjis.2.i386", product: { name: "bash-0:3.2-33.el5_11.1.sjis.2.i386", product_id: "bash-0:3.2-33.el5_11.1.sjis.2.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.2?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.1.sjis.2.i386 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", }, product_reference: "bash-0:3.2-33.el5_11.1.sjis.2.i386", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.1.sjis.2.ia64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", }, product_reference: "bash-0:3.2-33.el5_11.1.sjis.2.ia64", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.1.sjis.2.src as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", }, product_reference: "bash-0:3.2-33.el5_11.1.sjis.2.src", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", }, product_reference: "bash-0:3.2-33.el5_11.1.sjis.2.x86_64", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server", product_id: "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", relates_to_product_reference: "5Server-SJIS-5.11.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.1.sjis.2.i686 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.1.sjis.2.i686", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.1.sjis.2.src as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.1.sjis.2.src", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 6 Server", product_id: "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", relates_to_product_reference: "6Server-SJIS-6.5.Z", }, ], }, vulnerabilities: [ { cve: "CVE-2014-7169", cwe: { id: "CWE-228", name: "Improper Handling of Syntactically Invalid Structure", }, discovery_date: "2014-09-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146319", }, ], notes: [ { category: "description", text: "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", title: "Vulnerability description", }, { category: "summary", text: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "RHBZ#1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "external", summary: "RHSB-shellshock", url: "https://access.redhat.com/security/vulnerabilities/shellshock", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7169", url: "https://www.cve.org/CVERecord?id=CVE-2014-7169", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T21:28:16+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1312", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2022-01-28T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7186", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, discovery_date: "2014-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146791", }, ], notes: [ { category: "description", text: "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", title: "Vulnerability description", }, { category: "summary", text: "bash: parser can allow out-of-bounds memory access while handling redir_stack", title: "Vulnerability summary", }, { category: "other", text: "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7186", }, { category: "external", summary: "RHBZ#1146791", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146791", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7186", url: "https://www.cve.org/CVERecord?id=CVE-2014-7186", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", }, ], release_date: "2014-09-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T21:28:16+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1312", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: parser can allow out-of-bounds memory access while handling redir_stack", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7187", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2014-09-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146804", }, ], notes: [ { category: "description", text: "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", title: "Vulnerability description", }, { category: "summary", text: "bash: off-by-one error in deeply nested flow control constructs", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "RHBZ#1146804", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146804", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7187", url: "https://www.cve.org/CVERecord?id=CVE-2014-7187", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", }, ], release_date: "2014-09-26T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T21:28:16+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1312", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.src", "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.2.x86_64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.i386", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.ia64", "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.src", "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.2.x86_64", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.i686", "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.2.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: off-by-one error in deeply nested flow control constructs", }, ], }
rhsa-2014_1306
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "[Updated September 30, 2014]\nThis advisory has been updated with information on restarting system\nservices after applying this update. No changes have been made to the\noriginal packages.\n\nUpdated bash packages that fix one security issue are now available for Red\nHat Enterprise Linux 5, 6, and 7.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", title: "Topic", }, { category: "general", text: "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create bash functions as environment variables\nneed to be made aware of changes to the way names are handled by this\nupdate. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login.\nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted. For more information see the Knowledgebase article\nat https://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes.\n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2014:1306", url: "https://access.redhat.com/errata/RHSA-2014:1306", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "external", summary: "https://access.redhat.com/articles/1200223", url: "https://access.redhat.com/articles/1200223", }, { category: "external", summary: "1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1306.json", }, ], title: "Red Hat Security Advisory: bash security update", tracking: { current_release_date: "2024-11-14T16:26:09+00:00", generator: { date: "2024-11-14T16:26:09+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.0", }, }, id: "RHSA-2014:1306", initial_release_date: "2014-09-26T01:46:36+00:00", revision_history: [ { date: "2014-09-26T01:46:36+00:00", number: "1", summary: "Initial version", }, { date: "2014-09-30T16:02:45+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-14T16:26:09+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Desktop (v. 6)", product: { name: "Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop Optional (v. 6)", product: { name: "Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux HPC Node (v. 6)", product: { name: "Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux HPC Node Optional (v. 6)", product: { name: "Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 6)", product: { name: "Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 6)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 6)", product: { name: "Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 6)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:6::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Client (v. 7)", product: { name: "Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Client Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Desktop (v. 5 client)", product: { name: "Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux (v. 5 server)", product: { name: "Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:5::server", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "bash-0:4.1.2-15.el6_5.2.src", product: { name: "bash-0:4.1.2-15.el6_5.2.src", product_id: "bash-0:4.1.2-15.el6_5.2.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=src", }, }, }, { category: "product_version", name: "bash-0:4.2.45-5.el7_0.4.src", product: { name: "bash-0:4.2.45-5.el7_0.4.src", product_id: "bash-0:4.2.45-5.el7_0.4.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=src", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.4.src", product: { name: "bash-0:3.2-33.el5_11.4.src", product_id: "bash-0:3.2-33.el5_11.4.src", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", product: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", product_id: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=i686", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_5.2.i686", product: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686", product_id: "bash-doc-0:4.1.2-15.el6_5.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=i686", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_5.2.i686", product: { name: "bash-0:4.1.2-15.el6_5.2.i686", product_id: "bash-0:4.1.2-15.el6_5.2.i686", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", product: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", product_id: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", product: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", product_id: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_5.2.x86_64", product: { name: "bash-0:4.1.2-15.el6_5.2.x86_64", product_id: "bash-0:4.1.2-15.el6_5.2.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", product: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", product_id: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.2.45-5.el7_0.4?arch=x86_64", }, }, }, { category: "product_version", name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", product: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", product_id: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.2.45-5.el7_0.4?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:4.2.45-5.el7_0.4.x86_64", product: { name: "bash-0:4.2.45-5.el7_0.4.x86_64", product_id: "bash-0:4.2.45-5.el7_0.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=x86_64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", product: { name: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", product_id: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=x86_64", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.4.x86_64", product: { name: "bash-0:3.2-33.el5_11.4.x86_64", product_id: "bash-0:3.2-33.el5_11.4.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", product: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", product_id: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=s390x", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_5.2.s390x", product: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x", product_id: "bash-doc-0:4.1.2-15.el6_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=s390x", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_5.2.s390x", product: { name: "bash-0:4.1.2-15.el6_5.2.s390x", product_id: "bash-0:4.1.2-15.el6_5.2.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=s390x", }, }, }, { category: "product_version", name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", product: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", product_id: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.2.45-5.el7_0.4?arch=s390x", }, }, }, { category: "product_version", name: "bash-doc-0:4.2.45-5.el7_0.4.s390x", product: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x", product_id: "bash-doc-0:4.2.45-5.el7_0.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.2.45-5.el7_0.4?arch=s390x", }, }, }, { category: "product_version", name: "bash-0:4.2.45-5.el7_0.4.s390x", product: { name: "bash-0:4.2.45-5.el7_0.4.s390x", product_id: "bash-0:4.2.45-5.el7_0.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=s390x", }, }, }, { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.4.s390x", product: { name: "bash-debuginfo-0:3.2-33.el5_11.4.s390x", product_id: "bash-debuginfo-0:3.2-33.el5_11.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=s390x", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.4.s390x", product: { name: "bash-0:3.2-33.el5_11.4.s390x", product_id: "bash-0:3.2-33.el5_11.4.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", product: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", product_id: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.2?arch=ppc64", }, }, }, { category: "product_version", name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", product: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", product_id: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.2?arch=ppc64", }, }, }, { category: "product_version", name: "bash-0:4.1.2-15.el6_5.2.ppc64", product: { name: "bash-0:4.1.2-15.el6_5.2.ppc64", product_id: "bash-0:4.1.2-15.el6_5.2.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.1.2-15.el6_5.2?arch=ppc64", }, }, }, { category: "product_version", name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", product: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", product_id: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@4.2.45-5.el7_0.4?arch=ppc64", }, }, }, { category: "product_version", name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", product: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", product_id: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-doc@4.2.45-5.el7_0.4?arch=ppc64", }, }, }, { category: "product_version", name: "bash-0:4.2.45-5.el7_0.4.ppc64", product: { name: "bash-0:4.2.45-5.el7_0.4.ppc64", product_id: "bash-0:4.2.45-5.el7_0.4.ppc64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@4.2.45-5.el7_0.4?arch=ppc64", }, }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.4.i386", product: { name: "bash-debuginfo-0:3.2-33.el5_11.4.i386", product_id: "bash-debuginfo-0:3.2-33.el5_11.4.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=i386", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.4.i386", product: { name: "bash-0:3.2-33.el5_11.4.i386", product_id: "bash-0:3.2-33.el5_11.4.i386", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=i386", }, }, }, ], category: "architecture", name: "i386", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.4.ia64", product: { name: "bash-debuginfo-0:3.2-33.el5_11.4.ia64", product_id: "bash-debuginfo-0:3.2-33.el5_11.4.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=ia64", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.4.ia64", product: { name: "bash-0:3.2-33.el5_11.4.ia64", product_id: "bash-0:3.2-33.el5_11.4.ia64", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=ia64", }, }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "bash-debuginfo-0:3.2-33.el5_11.4.ppc", product: { name: "bash-debuginfo-0:3.2-33.el5_11.4.ppc", product_id: "bash-debuginfo-0:3.2-33.el5_11.4.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.4?arch=ppc", }, }, }, { category: "product_version", name: "bash-0:3.2-33.el5_11.4.ppc", product: { name: "bash-0:3.2-33.el5_11.4.ppc", product_id: "bash-0:3.2-33.el5_11.4.ppc", product_identification_helper: { purl: "pkg:rpm/redhat/bash@3.2-33.el5_11.4?arch=ppc", }, }, }, ], category: "architecture", name: "ppc", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", }, product_reference: "bash-0:3.2-33.el5_11.4.i386", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", }, product_reference: "bash-0:3.2-33.el5_11.4.ia64", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", }, product_reference: "bash-0:3.2-33.el5_11.4.ppc", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", }, product_reference: "bash-0:3.2-33.el5_11.4.s390x", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", }, product_reference: "bash-0:3.2-33.el5_11.4.src", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", }, product_reference: "bash-0:3.2-33.el5_11.4.x86_64", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.i386", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.ia64", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.ppc", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.s390x", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", product_id: "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", relates_to_product_reference: "5Client-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", }, product_reference: "bash-0:3.2-33.el5_11.4.i386", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", }, product_reference: "bash-0:3.2-33.el5_11.4.ia64", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", }, product_reference: "bash-0:3.2-33.el5_11.4.ppc", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", }, product_reference: "bash-0:3.2-33.el5_11.4.s390x", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.src as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", }, product_reference: "bash-0:3.2-33.el5_11.4.src", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", }, product_reference: "bash-0:3.2-33.el5_11.4.x86_64", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.i386", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.ia64", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.ppc", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.s390x", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", product_id: "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", }, product_reference: "bash-debuginfo-0:3.2-33.el5_11.4.x86_64", relates_to_product_reference: "5Server-5.11.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", product_id: "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Client-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", product_id: "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Client-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", product_id: "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6ComputeNode-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", product_id: "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6ComputeNode-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", product_id: "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Server-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", product_id: "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Server-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", product_id: "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Workstation-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", }, product_reference: "bash-0:4.1.2-15.el6_5.2.src", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.i686", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.ppc64", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.s390x", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.1.2-15.el6_5.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", product_id: "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", }, product_reference: "bash-doc-0:4.1.2-15.el6_5.2.x86_64", relates_to_product_reference: "6Workstation-optional-6.5.z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Client-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Client-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7ComputeNode-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Server-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Server-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Workstation-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", }, product_reference: "bash-0:4.2.45-5.el7_0.4.src", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.ppc64", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.s390x", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, { category: "default_component_of", full_product_name: { name: "bash-doc-0:4.2.45-5.el7_0.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", }, product_reference: "bash-doc-0:4.2.45-5.el7_0.4.x86_64", relates_to_product_reference: "7Workstation-optional-7.0.Z", }, ], }, vulnerabilities: [ { cve: "CVE-2014-7169", cwe: { id: "CWE-228", name: "Improper Handling of Syntactically Invalid Structure", }, discovery_date: "2014-09-24T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146319", }, ], notes: [ { category: "description", text: "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.", title: "Vulnerability description", }, { category: "summary", text: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", title: "Vulnerability summary", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "RHBZ#1146319", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", }, { category: "external", summary: "RHSB-shellshock", url: "https://access.redhat.com/security/vulnerabilities/shellshock", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7169", url: "https://www.cve.org/CVERecord?id=CVE-2014-7169", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7169", }, { category: "external", summary: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", url: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, ], release_date: "2014-09-24T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T01:46:36+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1306", }, ], scores: [ { cvss_v2: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], }, ], threats: [ { category: "exploit_status", date: "2022-01-28T00:00:00+00:00", details: "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog", }, { category: "impact", details: "Important", }, ], title: "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7186", cwe: { id: "CWE-119", name: "Improper Restriction of Operations within the Bounds of a Memory Buffer", }, discovery_date: "2014-09-25T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146791", }, ], notes: [ { category: "description", text: "It was discovered that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.", title: "Vulnerability description", }, { category: "summary", text: "bash: parser can allow out-of-bounds memory access while handling redir_stack", title: "Vulnerability summary", }, { category: "other", text: "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7186", }, { category: "external", summary: "RHBZ#1146791", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146791", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7186", url: "https://www.cve.org/CVERecord?id=CVE-2014-7186", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", }, ], release_date: "2014-09-25T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T01:46:36+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1306", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: parser can allow out-of-bounds memory access while handling redir_stack", }, { acknowledgments: [ { names: [ "Florian Weimer", ], organization: "Red Hat Product Security", summary: "This issue was discovered by Red Hat.", }, ], cve: "CVE-2014-7187", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2014-09-26T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1146804", }, ], notes: [ { category: "description", text: "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.", title: "Vulnerability description", }, { category: "summary", text: "bash: off-by-one error in deeply nested flow control constructs", title: "Vulnerability summary", }, { category: "other", text: "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "RHBZ#1146804", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1146804", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2014-7187", url: "https://www.cve.org/CVERecord?id=CVE-2014-7187", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", }, ], release_date: "2014-09-26T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2014-09-26T01:46:36+00:00", details: "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258", product_ids: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2014:1306", }, ], scores: [ { cvss_v2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, products: [ "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Client-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.src", "5Server-5.11.Z:bash-0:3.2-33.el5_11.4.x86_64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.i386", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ia64", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.ppc", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.s390x", "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5_11.4.x86_64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.src", "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.2.x86_64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.i686", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.ppc64", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.s390x", "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.2.x86_64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.src", "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.4.x86_64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.ppc64", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.s390x", "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.4.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "bash: off-by-one error in deeply nested flow control constructs", }, ], }
opensuse-su-2024:10106-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "bash-4.4-92.1 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the bash-4.4-92.1 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10106", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10106-1.json", }, { category: "self", summary: "SUSE CVE CVE-2014-2524 page", url: "https://www.suse.com/security/cve/CVE-2014-2524/", }, { category: "self", summary: "SUSE CVE CVE-2014-6271 page", url: "https://www.suse.com/security/cve/CVE-2014-6271/", }, { category: "self", summary: "SUSE CVE CVE-2014-6277 page", url: "https://www.suse.com/security/cve/CVE-2014-6277/", }, { category: "self", summary: "SUSE CVE CVE-2014-6278 page", url: "https://www.suse.com/security/cve/CVE-2014-6278/", }, { category: "self", summary: "SUSE CVE CVE-2014-7169 page", url: "https://www.suse.com/security/cve/CVE-2014-7169/", }, { category: "self", summary: "SUSE CVE CVE-2014-7186 page", url: "https://www.suse.com/security/cve/CVE-2014-7186/", }, { category: "self", summary: "SUSE CVE CVE-2014-7187 page", url: "https://www.suse.com/security/cve/CVE-2014-7187/", }, { category: "self", summary: "SUSE CVE CVE-2016-9401 page", url: "https://www.suse.com/security/cve/CVE-2016-9401/", }, ], title: "bash-4.4-92.1 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10106-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "bash-4.4-92.1.aarch64", product: { name: "bash-4.4-92.1.aarch64", product_id: "bash-4.4-92.1.aarch64", }, }, { category: "product_version", name: "bash-devel-4.4-92.1.aarch64", product: { name: "bash-devel-4.4-92.1.aarch64", product_id: "bash-devel-4.4-92.1.aarch64", }, }, { category: "product_version", name: "bash-doc-4.4-92.1.aarch64", product: { name: "bash-doc-4.4-92.1.aarch64", product_id: "bash-doc-4.4-92.1.aarch64", }, }, { category: "product_version", name: "bash-lang-4.4-92.1.aarch64", product: { name: "bash-lang-4.4-92.1.aarch64", product_id: "bash-lang-4.4-92.1.aarch64", }, }, { category: "product_version", name: "bash-loadables-4.4-92.1.aarch64", product: { name: "bash-loadables-4.4-92.1.aarch64", product_id: "bash-loadables-4.4-92.1.aarch64", }, }, { category: "product_version", name: "libreadline7-7.0-92.1.aarch64", product: { name: "libreadline7-7.0-92.1.aarch64", product_id: "libreadline7-7.0-92.1.aarch64", }, }, { category: "product_version", name: "libreadline7-32bit-7.0-92.1.aarch64", product: { name: "libreadline7-32bit-7.0-92.1.aarch64", product_id: "libreadline7-32bit-7.0-92.1.aarch64", }, }, { category: "product_version", name: "readline-devel-7.0-92.1.aarch64", product: { name: "readline-devel-7.0-92.1.aarch64", product_id: "readline-devel-7.0-92.1.aarch64", }, }, { category: "product_version", name: "readline-devel-32bit-7.0-92.1.aarch64", product: { name: "readline-devel-32bit-7.0-92.1.aarch64", product_id: "readline-devel-32bit-7.0-92.1.aarch64", }, }, { category: "product_version", name: "readline-doc-7.0-92.1.aarch64", product: { name: "readline-doc-7.0-92.1.aarch64", product_id: "readline-doc-7.0-92.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "bash-4.4-92.1.ppc64le", product: { name: "bash-4.4-92.1.ppc64le", product_id: "bash-4.4-92.1.ppc64le", }, }, { category: "product_version", name: "bash-devel-4.4-92.1.ppc64le", product: { name: "bash-devel-4.4-92.1.ppc64le", product_id: "bash-devel-4.4-92.1.ppc64le", }, }, { category: "product_version", name: "bash-doc-4.4-92.1.ppc64le", product: { name: "bash-doc-4.4-92.1.ppc64le", product_id: "bash-doc-4.4-92.1.ppc64le", }, }, { category: "product_version", name: "bash-lang-4.4-92.1.ppc64le", product: { name: "bash-lang-4.4-92.1.ppc64le", product_id: "bash-lang-4.4-92.1.ppc64le", }, }, { category: "product_version", name: "bash-loadables-4.4-92.1.ppc64le", product: { name: "bash-loadables-4.4-92.1.ppc64le", product_id: "bash-loadables-4.4-92.1.ppc64le", }, }, { category: "product_version", name: "libreadline7-7.0-92.1.ppc64le", product: { name: "libreadline7-7.0-92.1.ppc64le", product_id: "libreadline7-7.0-92.1.ppc64le", }, }, { category: "product_version", name: "libreadline7-32bit-7.0-92.1.ppc64le", product: { name: "libreadline7-32bit-7.0-92.1.ppc64le", product_id: "libreadline7-32bit-7.0-92.1.ppc64le", }, }, { category: "product_version", name: "readline-devel-7.0-92.1.ppc64le", product: { name: "readline-devel-7.0-92.1.ppc64le", product_id: "readline-devel-7.0-92.1.ppc64le", }, }, { category: "product_version", name: "readline-devel-32bit-7.0-92.1.ppc64le", product: { name: "readline-devel-32bit-7.0-92.1.ppc64le", product_id: "readline-devel-32bit-7.0-92.1.ppc64le", }, }, { category: "product_version", name: "readline-doc-7.0-92.1.ppc64le", product: { name: "readline-doc-7.0-92.1.ppc64le", product_id: "readline-doc-7.0-92.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "bash-4.4-92.1.s390x", product: { name: "bash-4.4-92.1.s390x", product_id: "bash-4.4-92.1.s390x", }, }, { category: "product_version", name: "bash-devel-4.4-92.1.s390x", product: { name: "bash-devel-4.4-92.1.s390x", product_id: "bash-devel-4.4-92.1.s390x", }, }, { category: "product_version", name: "bash-doc-4.4-92.1.s390x", product: { name: "bash-doc-4.4-92.1.s390x", product_id: "bash-doc-4.4-92.1.s390x", }, }, { category: "product_version", name: "bash-lang-4.4-92.1.s390x", product: { name: "bash-lang-4.4-92.1.s390x", product_id: "bash-lang-4.4-92.1.s390x", }, }, { category: "product_version", name: "bash-loadables-4.4-92.1.s390x", product: { name: "bash-loadables-4.4-92.1.s390x", product_id: "bash-loadables-4.4-92.1.s390x", }, }, { category: "product_version", name: "libreadline7-7.0-92.1.s390x", product: { name: "libreadline7-7.0-92.1.s390x", product_id: "libreadline7-7.0-92.1.s390x", }, }, { category: "product_version", name: "libreadline7-32bit-7.0-92.1.s390x", product: { name: "libreadline7-32bit-7.0-92.1.s390x", product_id: "libreadline7-32bit-7.0-92.1.s390x", }, }, { category: "product_version", name: "readline-devel-7.0-92.1.s390x", product: { name: "readline-devel-7.0-92.1.s390x", product_id: "readline-devel-7.0-92.1.s390x", }, }, { category: "product_version", name: "readline-devel-32bit-7.0-92.1.s390x", product: { name: "readline-devel-32bit-7.0-92.1.s390x", product_id: "readline-devel-32bit-7.0-92.1.s390x", }, }, { category: "product_version", name: "readline-doc-7.0-92.1.s390x", product: { name: "readline-doc-7.0-92.1.s390x", product_id: "readline-doc-7.0-92.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "bash-4.4-92.1.x86_64", product: { name: "bash-4.4-92.1.x86_64", product_id: "bash-4.4-92.1.x86_64", }, }, { category: "product_version", name: "bash-devel-4.4-92.1.x86_64", product: { name: "bash-devel-4.4-92.1.x86_64", product_id: "bash-devel-4.4-92.1.x86_64", }, }, { category: "product_version", name: "bash-doc-4.4-92.1.x86_64", product: { name: "bash-doc-4.4-92.1.x86_64", product_id: "bash-doc-4.4-92.1.x86_64", }, }, { category: "product_version", name: "bash-lang-4.4-92.1.x86_64", product: { name: "bash-lang-4.4-92.1.x86_64", product_id: "bash-lang-4.4-92.1.x86_64", }, }, { category: "product_version", name: "bash-loadables-4.4-92.1.x86_64", product: { name: "bash-loadables-4.4-92.1.x86_64", product_id: "bash-loadables-4.4-92.1.x86_64", }, }, { category: "product_version", name: "libreadline7-7.0-92.1.x86_64", product: { name: "libreadline7-7.0-92.1.x86_64", product_id: "libreadline7-7.0-92.1.x86_64", }, }, { category: "product_version", name: "libreadline7-32bit-7.0-92.1.x86_64", product: { name: "libreadline7-32bit-7.0-92.1.x86_64", product_id: "libreadline7-32bit-7.0-92.1.x86_64", }, }, { category: "product_version", name: "readline-devel-7.0-92.1.x86_64", product: { name: "readline-devel-7.0-92.1.x86_64", product_id: "readline-devel-7.0-92.1.x86_64", }, }, { category: "product_version", name: "readline-devel-32bit-7.0-92.1.x86_64", product: { name: "readline-devel-32bit-7.0-92.1.x86_64", product_id: "readline-devel-32bit-7.0-92.1.x86_64", }, }, { category: "product_version", name: "readline-doc-7.0-92.1.x86_64", product: { name: "readline-doc-7.0-92.1.x86_64", product_id: "readline-doc-7.0-92.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "bash-4.4-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", }, product_reference: "bash-4.4-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-4.4-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", }, product_reference: "bash-4.4-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-4.4-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-4.4-92.1.s390x", }, product_reference: "bash-4.4-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-4.4-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", }, product_reference: "bash-4.4-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-devel-4.4-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", }, product_reference: "bash-devel-4.4-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-devel-4.4-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", }, product_reference: "bash-devel-4.4-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-devel-4.4-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", }, product_reference: "bash-devel-4.4-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-devel-4.4-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", }, product_reference: "bash-devel-4.4-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-doc-4.4-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", }, product_reference: "bash-doc-4.4-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-doc-4.4-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", }, product_reference: "bash-doc-4.4-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-doc-4.4-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", }, product_reference: "bash-doc-4.4-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-doc-4.4-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", }, product_reference: "bash-doc-4.4-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-lang-4.4-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", }, product_reference: "bash-lang-4.4-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-lang-4.4-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", }, product_reference: "bash-lang-4.4-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-lang-4.4-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", }, product_reference: "bash-lang-4.4-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-lang-4.4-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", }, product_reference: "bash-lang-4.4-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-loadables-4.4-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", }, product_reference: "bash-loadables-4.4-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-loadables-4.4-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", }, product_reference: "bash-loadables-4.4-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-loadables-4.4-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", }, product_reference: "bash-loadables-4.4-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "bash-loadables-4.4-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", }, product_reference: "bash-loadables-4.4-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libreadline7-7.0-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", }, product_reference: "libreadline7-7.0-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libreadline7-7.0-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", }, product_reference: "libreadline7-7.0-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libreadline7-7.0-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", }, product_reference: "libreadline7-7.0-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libreadline7-7.0-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", }, product_reference: "libreadline7-7.0-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libreadline7-32bit-7.0-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", }, product_reference: "libreadline7-32bit-7.0-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libreadline7-32bit-7.0-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", }, product_reference: "libreadline7-32bit-7.0-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libreadline7-32bit-7.0-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", }, product_reference: "libreadline7-32bit-7.0-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libreadline7-32bit-7.0-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", }, product_reference: "libreadline7-32bit-7.0-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-devel-7.0-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", }, product_reference: "readline-devel-7.0-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-devel-7.0-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", }, product_reference: "readline-devel-7.0-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-devel-7.0-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", }, product_reference: "readline-devel-7.0-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-devel-7.0-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", }, product_reference: "readline-devel-7.0-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-devel-32bit-7.0-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", }, product_reference: "readline-devel-32bit-7.0-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-devel-32bit-7.0-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", }, product_reference: "readline-devel-32bit-7.0-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-devel-32bit-7.0-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", }, product_reference: "readline-devel-32bit-7.0-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-devel-32bit-7.0-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", }, product_reference: "readline-devel-32bit-7.0-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-doc-7.0-92.1.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", }, product_reference: "readline-doc-7.0-92.1.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-doc-7.0-92.1.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", }, product_reference: "readline-doc-7.0-92.1.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-doc-7.0-92.1.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", }, product_reference: "readline-doc-7.0-92.1.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "readline-doc-7.0-92.1.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", }, product_reference: "readline-doc-7.0-92.1.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2014-2524", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-2524", }, ], notes: [ { category: "general", text: "The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-2524", url: "https://www.suse.com/security/cve/CVE-2014-2524", }, { category: "external", summary: "SUSE Bug 868822 for CVE-2014-2524", url: "https://bugzilla.suse.com/868822", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2014-2524", }, { cve: "CVE-2014-6271", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6271", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6271", url: "https://www.suse.com/security/cve/CVE-2014-6271", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-6271", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 1130324 for CVE-2014-6271", url: "https://bugzilla.suse.com/1130324", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2014-6271", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 896776 for CVE-2014-6271", url: "https://bugzilla.suse.com/896776", }, { category: "external", summary: "SUSE Bug 898346 for CVE-2014-6271", url: "https://bugzilla.suse.com/898346", }, { category: "external", summary: "SUSE Bug 898604 for CVE-2014-6271", url: "https://bugzilla.suse.com/898604", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6271", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6271", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6271", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-6271", url: "https://bugzilla.suse.com/900454", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2014-6271", }, { cve: "CVE-2014-6277", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6277", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6277", url: "https://www.suse.com/security/cve/CVE-2014-6277", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6277", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6277", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6277", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-6277", url: "https://bugzilla.suse.com/900454", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2014-6277", }, { cve: "CVE-2014-6278", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6278", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6278", url: "https://www.suse.com/security/cve/CVE-2014-6278", }, { category: "external", summary: "SUSE Bug 898604 for CVE-2014-6278", url: "https://bugzilla.suse.com/898604", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6278", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6278", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6278", url: "https://bugzilla.suse.com/900127", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2014-6278", }, { cve: "CVE-2014-7169", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7169", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7169", url: "https://www.suse.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-7169", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 1130324 for CVE-2014-7169", url: "https://bugzilla.suse.com/1130324", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2014-7169", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 896776 for CVE-2014-7169", url: "https://bugzilla.suse.com/896776", }, { category: "external", summary: "SUSE Bug 898346 for CVE-2014-7169", url: "https://bugzilla.suse.com/898346", }, { category: "external", summary: "SUSE Bug 898762 for CVE-2014-7169", url: "https://bugzilla.suse.com/898762", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-7169", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-7169", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 899039 for CVE-2014-7169", url: "https://bugzilla.suse.com/899039", }, { category: "external", summary: "SUSE Bug 899266 for CVE-2014-7169", url: "https://bugzilla.suse.com/899266", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-7169", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-7169", url: "https://bugzilla.suse.com/900454", }, { category: "external", summary: "SUSE Bug 902237 for CVE-2014-7169", url: "https://bugzilla.suse.com/902237", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2014-7169", }, { cve: "CVE-2014-7186", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7186", }, ], notes: [ { category: "general", text: "The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the \"redir_stack\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7186", url: "https://www.suse.com/security/cve/CVE-2014-7186", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-7186", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 898603 for CVE-2014-7186", url: "https://bugzilla.suse.com/898603", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-7186", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-7186", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 899039 for CVE-2014-7186", url: "https://bugzilla.suse.com/899039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-7186", }, { cve: "CVE-2014-7187", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7187", }, ], notes: [ { category: "general", text: "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7187", url: "https://www.suse.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-7187", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 898603 for CVE-2014-7187", url: "https://bugzilla.suse.com/898603", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-7187", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-7187", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 899039 for CVE-2014-7187", url: "https://bugzilla.suse.com/899039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2014-7187", }, { cve: "CVE-2016-9401", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9401", }, ], notes: [ { category: "general", text: "popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9401", url: "https://www.suse.com/security/cve/CVE-2016-9401", }, { category: "external", summary: "SUSE Bug 1010845 for CVE-2016-9401", url: "https://bugzilla.suse.com/1010845", }, { category: "external", summary: "SUSE Bug 1044328 for CVE-2016-9401", url: "https://bugzilla.suse.com/1044328", }, { category: "external", summary: "SUSE Bug 1123788 for CVE-2016-9401", url: "https://bugzilla.suse.com/1123788", }, { category: "external", summary: "SUSE Bug 1159416 for CVE-2016-9401", url: "https://bugzilla.suse.com/1159416", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:bash-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x", "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64", "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le", "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x", "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64", "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le", "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x", "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2016-9401", }, ], }
var-201409-1148
Vulnerability from variot
Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue. QNAP Systems, Inc. Provided by QTS teeth, Turbo NAS for OS is. QTS for, GNU Bash Vulnerability (JVNVU#97219505) caused by OS Command injection vulnerability (CWE-78) Exists. This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : University of Electro-Communications Wakisaka Yuki MrAny application permission OS The command may be executed. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. GNU Bash 3.2 and later are vulnerable; prior versions may also be affected.
HP StoreEver ESL E-series Tape Library
- Disable DHCP and only use static IP addressing.
HP Virtual Library System (VLS)
- Disable DHCP and only use static IP addressing.
This vulnerability allows users that have been granted access to a shell script to escalate privilege and execute unrestricted commands at the same security level as the Bash script.
Open the PXE Configuration Utility on the HP Insight Control server deployment window Select Linux Managed from the Boot Menu options Click the Edit button. Clicking the Edit button displays the Edit Shared Menu Option window Uncheck the x86 option in Operating System and Processor Options and click OK. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: bash security update Advisory ID: RHSA-2014:1311-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-1311.html Issue date: 2014-09-26 CVE Names: CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 =====================================================================
- Summary:
Updated bash packages that fix one security issue are now available for Red Hat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise Linux 5.6 Long Life, Red Hat Enterprise Linux 5.9 Extended Update Support, Red Hat Enterprise Linux 6.2 Advanced Update Support, and Red Hat Enterprise Linux 6.4 Extended Update Support.
Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux AS (v. 4 ELS) - i386, ia64, x86_64 Red Hat Enterprise Linux AUS (v. 6.2 server) - x86_64 Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4) - x86_64 Red Hat Enterprise Linux ES (v. 4 ELS) - i386, x86_64 Red Hat Enterprise Linux EUS (v. 5.9 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux HPC Node EUS (v. 6.4) - x86_64 Red Hat Enterprise Linux LL (v. 5.6 server) - i386, ia64, x86_64 Red Hat Enterprise Linux Server EUS (v. 6.4) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional AUS (v. 6.2) - x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 6.4) - i386, ppc64, s390x, x86_64
- Description:
The GNU Bourne Again shell (Bash) is a shell and command language interpreter compatible with the Bourne shell (sh). Bash is the default shell for Red Hat Enterprise Linux.
It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue. (CVE-2014-7169)
Applications which directly create Bash functions as environment variables need to be made aware of the changes to the way names are handled by this update. For more information see the Knowledgebase article at https://access.redhat.com/articles/1200223
Note: Docker users are advised to use "yum update" within their containers, and to commit the resulting changes.
For additional information on CVE-2014-6271 and CVE-2014-7169, refer to the aforementioned Knowledgebase article.
All bash users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1146319 - CVE-2014-7169 bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)
- Package List:
Red Hat Enterprise Linux AS (v. 4 ELS):
Source: bash-3.0-27.el4.4.src.rpm
i386: bash-3.0-27.el4.4.i386.rpm bash-debuginfo-3.0-27.el4.4.i386.rpm
ia64: bash-3.0-27.el4.4.i386.rpm bash-3.0-27.el4.4.ia64.rpm bash-debuginfo-3.0-27.el4.4.i386.rpm bash-debuginfo-3.0-27.el4.4.ia64.rpm
x86_64: bash-3.0-27.el4.4.x86_64.rpm bash-debuginfo-3.0-27.el4.4.x86_64.rpm
Red Hat Enterprise Linux ES (v. 4 ELS):
Source: bash-3.0-27.el4.4.src.rpm
i386: bash-3.0-27.el4.4.i386.rpm bash-debuginfo-3.0-27.el4.4.i386.rpm
x86_64: bash-3.0-27.el4.4.x86_64.rpm bash-debuginfo-3.0-27.el4.4.x86_64.rpm
Red Hat Enterprise Linux LL (v. 5.6 server):
Source: bash-3.2-24.el5_6.2.src.rpm
i386: bash-3.2-24.el5_6.2.i386.rpm bash-debuginfo-3.2-24.el5_6.2.i386.rpm
ia64: bash-3.2-24.el5_6.2.i386.rpm bash-3.2-24.el5_6.2.ia64.rpm bash-debuginfo-3.2-24.el5_6.2.i386.rpm bash-debuginfo-3.2-24.el5_6.2.ia64.rpm
x86_64: bash-3.2-24.el5_6.2.x86_64.rpm bash-debuginfo-3.2-24.el5_6.2.x86_64.rpm
Red Hat Enterprise Linux EUS (v. 5.9 server):
Source: bash-3.2-32.el5_9.3.src.rpm
i386: bash-3.2-32.el5_9.3.i386.rpm bash-debuginfo-3.2-32.el5_9.3.i386.rpm
ia64: bash-3.2-32.el5_9.3.i386.rpm bash-3.2-32.el5_9.3.ia64.rpm bash-debuginfo-3.2-32.el5_9.3.i386.rpm bash-debuginfo-3.2-32.el5_9.3.ia64.rpm
ppc: bash-3.2-32.el5_9.3.ppc.rpm bash-debuginfo-3.2-32.el5_9.3.ppc.rpm
s390x: bash-3.2-32.el5_9.3.s390x.rpm bash-debuginfo-3.2-32.el5_9.3.s390x.rpm
x86_64: bash-3.2-32.el5_9.3.x86_64.rpm bash-debuginfo-3.2-32.el5_9.3.x86_64.rpm
Red Hat Enterprise Linux HPC Node EUS (v. 6.4):
Source: bash-4.1.2-15.el6_4.2.src.rpm
x86_64: bash-4.1.2-15.el6_4.2.x86_64.rpm bash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm
Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4):
Source: bash-4.1.2-15.el6_4.2.src.rpm
x86_64: bash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm bash-doc-4.1.2-15.el6_4.2.x86_64.rpm
Red Hat Enterprise Linux AUS (v. 6.2 server):
Source: bash-4.1.2-9.el6_2.2.src.rpm
x86_64: bash-4.1.2-9.el6_2.2.x86_64.rpm bash-debuginfo-4.1.2-9.el6_2.2.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 6.4):
Source: bash-4.1.2-15.el6_4.2.src.rpm
i386: bash-4.1.2-15.el6_4.2.i686.rpm bash-debuginfo-4.1.2-15.el6_4.2.i686.rpm
ppc64: bash-4.1.2-15.el6_4.2.ppc64.rpm bash-debuginfo-4.1.2-15.el6_4.2.ppc64.rpm
s390x: bash-4.1.2-15.el6_4.2.s390x.rpm bash-debuginfo-4.1.2-15.el6_4.2.s390x.rpm
x86_64: bash-4.1.2-15.el6_4.2.x86_64.rpm bash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional AUS (v. 6.2):
Source: bash-4.1.2-9.el6_2.2.src.rpm
x86_64: bash-debuginfo-4.1.2-9.el6_2.2.x86_64.rpm bash-doc-4.1.2-9.el6_2.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional EUS (v. 6.4):
Source: bash-4.1.2-15.el6_4.2.src.rpm
i386: bash-debuginfo-4.1.2-15.el6_4.2.i686.rpm bash-doc-4.1.2-15.el6_4.2.i686.rpm
ppc64: bash-debuginfo-4.1.2-15.el6_4.2.ppc64.rpm bash-doc-4.1.2-15.el6_4.2.ppc64.rpm
s390x: bash-debuginfo-4.1.2-15.el6_4.2.s390x.rpm bash-doc-4.1.2-15.el6_4.2.s390x.rpm
x86_64: bash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm bash-doc-4.1.2-15.el6_4.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2014-7169.html https://www.redhat.com/security/data/cve/CVE-2014-7186.html https://www.redhat.com/security/data/cve/CVE-2014-7187.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/1200223
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFUJau9XlSAg2UNWIIRAhKkAKC931kAxA4S4exwT4uGhDr7uDFIKQCglKKS N0AJiOto/RXwBqHtbfr1wkM= =SeAK -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Summary
VMware product updates address Bash security vulnerabilities. Relevant Releases (Affected products for which remediation is present)
vCenter Log Insight 2.0
- Problem Description
a. Bash update for multiple products.
Bash libraries have been updated in multiple products to resolve
multiple critical security issues, also referred to as Shellshock.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the identifiers CVE-2014-6271, CVE-2014-7169,
CVE-2014-7186, and CVE-2014-7187 to these issues.
VMware products have been grouped into the following four
product categories:
I) ESXi and ESX Hypervisor
ESXi is not affected because ESXi uses the Ash shell (through
busybox), which is not affected by the vulnerability reported
for the Bash shell. See table 1 for
remediation for ESX.
II) Windows-based products
Windows-based products, including all versions of vCenter Server
running on Windows, are not affected.
III) VMware (virtual) appliances
VMware (virtual) appliances ship with an affected version of Bash.
See table 2 for remediation for appliances.
IV) Products that run on Linux, Android, OSX or iOS (excluding
virtual appliances)
Products that run on Linux, Android, OSX or iOS (excluding
virtual appliances) might use the Bash shell that is part of the
operating system. VMware recommends that customers
contact their operating system vendor for a patch.
MITIGATIONS
VMware encourages restricting access to appliances through
firewall rules and other network layer controls to only trusted IP
addresses. This measure will greatly reduce any risk to these
appliances.
RECOMMENDATIONS
VMware recommends customers evaluate and deploy patches for
affected products in Table 1 and 2 below as these
patches become available.
Column 4 of the following tables lists the action required to
remediate the vulnerability in each release, if a solution is
available.
Table 1 - ESXi and ESX Hypervisor
=================================
VMware Product Running Replace with/
Product Version on Apply Patch
============== ======= ======= =============
ESXi any ESXi Not affected
ESX 4.1 ESX Patch pending *
ESX 4.0 ESX Patch pending *
* VMware will make VMware ESX 4.0 and 4.1 security patches available
for the Bash shell vulnerability. This security patch release is an
exception to the existing VMware lifecycle policy.
Table 2 - Products that are shipped as a (virtual) appliance.
=============================================================
VMware Product Running Replace with/
Product Version on Apply Patch
============== ======= ======= =============
vCenter Server Appliance 5.x Linux Patch Pending
Horizon DaaS Platform 6.x Linux Patch Pending
Horizon Workspace 1.x, 2.x Linux Patch Pending
IT Business Management Suite 1.x Linux Patch Pending
NSX for Multi-Hypervisor 4.x Linux Patch Pending
NSX for vSphere 6.x Linux Patch Pending
NVP 3.x Linux Patch Pending
vCenter Converter Standalone 5.x Linux Patch Pending
vCenter Hyperic Server 5.x Linux Patch Pending
vCenter Infrastructure Navigator 5.x Linux Patch Pending
vCenter Log Insight 1.x, 2.x Linux 2.0 U1
vCenter Operations Manager 5.x Linux Patch Pending
vCenter Orchestrator Appliance 4.x, 5.x Linux Patch Pending
vCenter Site Recovery Manager 5.x Linux Patch Pending
** vCenter Support Assistant 5.x Linux Patch Pending vCloud Automation Center 6.x Linux Patch Pending vCloud Automation Center Application Services 6.x Linux Patch Pending vCloud Director Appliance 5.x Linux Patch Pending vCloud Connector 2.x Linux Patch Pending vCloud Networking and Security 5.x Linux Patch Pending vCloud Usage Meter 3.x Linux Patch Pending vFabric Application Director 5.x, 6.x Linux Patch Pending vFabric Postgres 9.x Linux Patch Pending Viewplanner 3.x Linux Patch Pending VMware Application Dependency Planner x.x Linux Patch Pending VMware Data Recovery 2.x Linux Patch Pending VMware HealthAnalyzer 5.x Linux Patch Pending VMware Mirage Gateway 5.x Linux Patch Pending VMware Socialcast On Premise x.x Linux Patch Pending VMware Studio 2.x Linux Patch Pending VMware TAM Data Manager x.x Linux Patch Pending VMware Workbench 3.x Linux Patch Pending vSphere App HA 1.x Linux Patch Pending vSphere Big Data Extensions 1.x, 2.x Linux Patch Pending vSphere Data Protection 5.x Linux Patch Pending vSphere Management Assistant 5.x Linux Patch Pending vSphere Replication 5.x Linux Patch Pending vSphere Storage Appliance 5.x Linux Patch Pending
** This product includes Virtual Appliances that will be updated, the
product itself is not a Virtual Appliance. Solution
vCenter Log Insight
Downloads: https://www.vmware.com/go/download-vcenter-log-insight (click Go to Downloads) Documentation: http://kb.vmware.com/kb/2091065
- References
VMware Knowledge Base Article 2090740 http://kb.vmware.com/kb/2090740
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 , http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187
- Change Log
2014-09-30 VMSA-2014-0010 Initial security advisory in conjunction with the release of vCenter Log Insight 2.0 U1 on 2014-09-30. Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce at lists.vmware.com
bugtraq at securityfocus.com
fulldisclosure at seclists.org
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories http://www.vmware.com/security/advisories
VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Policy https://www.vmware.com/support/policies/lifecycle.html
Twitter https://twitter.com/VMwareSRC
Copyright 2014 VMware Inc. All rights reserved.
Release Date: 2014-10-16 Last Updated: 2014-10-16
Potential Security Impact: Remote unauthorized access
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY A potential security vulnerability has been identified with certain HP StoreOnce Backup systems running Bash Shell. However, HP is unaware of any method that would allow this vulnerability to be exploited on HP StoreOnce Backup systems but is providing an updated version of Bash Shell as a precaution.
References:
CVE-2014-7169 CVE-2014-6271 CVE-2014-7187 CVE-2014-7186 SSRT101749
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP StoreOnce Backup software versions 3.0.0 to 3.11.3.
Please refer to the RESOLUTION section below for a list of impacted products.
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7186 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7187 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION HP has made the following updates available to resolve the vulnerability in HP StoreOnce Backup systems running Bash Shell.
HP StoreOnce Backup version 3.11.4 for the following products:
Product SKU Product Name
BB896A HP StoreOnce 6500 Backup
EJ022A HP StoreOnce B6200 Backup
BB903A HP StoreOnce 4900 Backup
BB877A HP StoreOnce 2700 Backup
BB878A HP StoreOnce 4500 Backup
BB879A HP StoreOnce 4700 Backup
HP StoreOnce 2610 iSCSI Backup system
BB852A HP StoreOnce 2620 iSCSI Backup system
BB853A HP StoreOnce 4210 iSCSI Backup system
BB854A HP StoreOnce 4210 FC Backup system
BB855A HP StoreOnce 4220 Backup system
BB856A HP StoreOnce 4420 Backup system
BB857A HP StoreOnce 4430 Backup system
TC458A/AAE HP StoreOnce VSA 10 TB 3 Year Software
D4T77A/AAE HP StoreOnce VSA 4 TB 3 Year Software
HISTORY Version:1 (rev.1) - 16 October 2014 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Relevant releases/architectures:
SJIS (v.
Shift_JIS, also known as "SJIS", is a character encoding for the Japanese language. This package provides bash support for the Shift_JIS encoding. Note that certain services, screen sessions, and tmux sessions may need to be restarted, and affected interactive users may need to re-login. Installing these updated packages without restarting services will address the vulnerability, but functionality may be impacted until affected services are restarted
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201409-1148", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "bash", scope: "eq", trust: 1.6, vendor: "gnu", version: "1.14.7", }, { model: "bash", scope: "eq", trust: 1.6, vendor: "gnu", version: "2.01", }, { model: "bash", scope: "eq", trust: 1.6, vendor: "gnu", version: "2.0", }, { model: "bash", scope: "eq", trust: 1.6, vendor: "gnu", version: "1.14.4", }, { model: "bash", scope: "eq", trust: 1.6, vendor: "gnu", version: "1.14.1", }, { model: "bash", scope: "eq", trust: 1.6, vendor: "gnu", version: "1.14.0", }, { model: "bash", scope: "eq", trust: 1.6, vendor: "gnu", version: "1.14.6", }, { model: "bash", scope: "eq", trust: 1.6, vendor: "gnu", version: "1.14.2", }, { model: "bash", scope: "eq", trust: 1.6, vendor: "gnu", version: "1.14.3", }, { model: "bash", scope: "eq", trust: 1.6, vendor: "gnu", version: "1.14.5", }, { model: "bash", scope: "eq", trust: 1.3, vendor: "gnu", version: "4.2", }, { model: "bash", scope: "eq", trust: 1.3, vendor: "gnu", version: "3.2.48", }, { model: "bash", scope: "eq", trust: 1.3, vendor: "gnu", version: "4.0", }, { model: "bash", scope: "eq", trust: 1.3, vendor: "gnu", version: "3.2", }, { model: "bash", scope: "eq", trust: 1.3, vendor: "gnu", version: "4.1", }, { model: "bash", scope: "eq", trust: 1.3, vendor: "gnu", version: "4.3", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "2.01.1", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "2.02", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "3.0.16", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "2.02.1", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "3.0", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "3.1", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "2.05", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "2.03", }, { model: "bash", scope: "eq", trust: 1, vendor: "gnu", version: "2.04", }, { model: "manageone v100r002c10", scope: null, trust: 0.9, vendor: "huawei", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "apple", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "avaya", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "barracuda", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "blue coat", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "centos", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "check point", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "cygwin", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "d link", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "debian gnu linux", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "dell computer", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "extreme", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "f5", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "fedora", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "fireeye", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "fortinet", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "gnu bash", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "gentoo linux", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "hewlett packard", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "ibm", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "juniper", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "mageia", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "mcafee", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "monroe", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "nec", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "niksun", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "netapp", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "novell", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "oracle", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "palo alto", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "qnap security", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "red hat", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "suse linux", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "slackware linux", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "sophos", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "trend micro", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "ubuntu", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "vmware", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "xirrus", version: null, }, { model: "bash", scope: "lte", trust: 0.8, vendor: "gnu", version: "4.3 bash43-026", }, { model: "qts", scope: "lte", trust: 0.8, vendor: "qnap", version: "4.1.1 build 0927 and earlier", }, { model: "qts", scope: "eq", trust: 0.8, vendor: "qnap", version: null, }, { model: "manageone v100r002c00", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "unified contact center express", scope: "eq", trust: 0.6, vendor: "cisco", version: "0", }, { model: "manageone v100r002c20", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "unity connection", scope: "eq", trust: 0.6, vendor: "cisco", version: "0", }, { model: "paging server", scope: "eq", trust: 0.6, vendor: "cisco", version: "0", }, { model: "smartcloud provisioning fixpack for sv", scope: "eq", trust: 0.3, vendor: "ibm", version: "2.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1689.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.924.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1049.1", }, { model: "oceanstor s5300 v100r001c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375127", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.77", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.31", }, { model: "ucs invicta appliance", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "secureplatform r75.30", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.71", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.46", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.51", }, { model: "security access manager for web", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.166", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.28", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.891.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.15", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v35007.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.27", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.306.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1012", }, { model: "manageone v100r001c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "e9000 blade server ch220 v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1005.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.42", }, { model: "email gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.6", }, { model: "integration bus", scope: "eq", trust: 0.3, vendor: "ibm", version: "9.0.0.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1039", }, { model: "enterprise linux server", scope: "eq", trust: 0.3, vendor: "redhat", version: "6", }, { model: "big-ip psm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.4.1", }, { model: "gaia embedded r75.47", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "aura communication manager sp5", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.67", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.434.0", }, { model: "telepresence manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "big-ip psm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.702.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1311.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.687.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.78", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.365.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.879.0", }, { model: "big-ip asm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.6.0", }, { model: "security access manager for mobile", scope: "eq", trust: 0.3, vendor: "ibm", version: "8.0.0.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.74", }, { model: "aura communication manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.317.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.92", }, { model: "protectier appliance edition", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.926.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.47255", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.408.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.39", }, { model: "oceanstor s5500t v200r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1077.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.24", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.366.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.97", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.530.0", }, { model: "puredata system for operational analytics", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.0", }, { model: null, scope: "eq", trust: 0.3, vendor: "ibm", version: "2053-4240", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.58", }, { model: "ip interoperability and collaboration system", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "asr series", scope: "eq", trust: 0.3, vendor: "cisco", version: "50000", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.47", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.57", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.122", }, { model: "key vault", scope: "eq", trust: 0.3, vendor: "oracle", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.59", }, { model: "database appliance", scope: "eq", trust: 0.3, vendor: "oracle", version: "12.1.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.57", }, { model: "big-ip ltm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.1", }, { model: "cloudsystem enterprise software", scope: "ne", trust: 0.3, vendor: "hp", version: "8.1.2", }, { model: "junos space ja1500 appliance", scope: "eq", trust: 0.3, vendor: "juniper", version: null, }, { model: "horizon workspace", scope: "eq", trust: 0.3, vendor: "vmware", version: "1.8", }, { model: "big-ip afm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.6.0", }, { model: "move antivirus agentless", scope: "eq", trust: 0.3, vendor: "mcafee", version: "2.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.342.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.15", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.366.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.51", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.73", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1036.2", }, { model: "oceanstor dorado g2 v100r001c00", scope: "eq", trust: 0.3, vendor: "huawei", version: "2100", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.82", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.62", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.56", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.28", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1308.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.87", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.633.0", }, { model: "big-ip apm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5.0", }, { model: "download server", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.105", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.769.0", }, { model: "big-ip asm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.4.1", }, { model: "prime license manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "aura conferencing standard", scope: "eq", trust: 0.3, vendor: "avaya", version: "7.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.54", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.127", }, { model: "gaia embedded r75.40vs", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "linux i386", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "10.04", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.785.0", }, { model: "solaris", scope: "eq", trust: 0.3, vendor: "oracle", version: "9", }, { model: "aura communication manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.60", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.225", }, { model: "secureplatform r77.10", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.418.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.385.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.319.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.27", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.908.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.204", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.62", }, { model: "oceanstor s5600 v100r005c02", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "unified intelligence center", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.366.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.25", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.78", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.219", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.374.0", }, { model: "email gateway patch", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.52", }, { model: "secureplatform r77", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.23", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.86", }, { model: "secureplatform r75.10", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.40", }, { model: "oneview", scope: "eq", trust: 0.3, vendor: "hp", version: "1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1043", }, { model: "rack server rh2288 v100r002c0", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.8", }, { model: "move antivirus agentless", scope: "eq", trust: 0.3, vendor: "mcafee", version: "3.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.40", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.604.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.58", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.44", }, { model: "big-ip edge gateway", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.35", }, { model: "secureplatform r70", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.150", }, { model: "gaia embedded r71.20", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.0", }, { model: "big-ip link controller", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2.1", }, { model: "vcenter orchestrator appliance", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.68", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.40", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.756.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.74", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.34", }, { model: "linux sparc", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "10.04", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.51", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.886.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.123", }, { model: "ipso r75.20", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "worklight quality assurance", scope: "eq", trust: 0.3, vendor: "ibm", version: "6.0", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v37007.2", }, { model: "oceanstor s2200t v100r005c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.51", }, { model: "aura experience portal", scope: "eq", trust: 0.3, vendor: "avaya", version: "7.0", }, { model: "gaia embedded r77.10", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.233", }, { model: "nvp", scope: "eq", trust: 0.3, vendor: "vmware", version: "3.2.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.54", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.88", }, { model: "big-ip apm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.1", }, { model: "oceanstor s6800t v200r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.64", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.955.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1082.0", }, { model: "big-ip ltm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.760.0", }, { model: "secure access link", scope: "eq", trust: 0.3, vendor: "avaya", version: "1.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.110", }, { model: "big-ip webaccelerator", scope: "eq", trust: 0.3, vendor: "f5", version: "10.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.12", }, { model: "ip office application server", scope: "eq", trust: 0.3, vendor: "avaya", version: "8.0", }, { model: "email gateway patch", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.01", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1658.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.368.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.23", }, { model: "flex system manager", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.3.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.594.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.118", }, { model: "clean access manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "gaia embedded r75.40", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.743.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.8", }, { model: "server automation", scope: "eq", trust: 0.3, vendor: "hp", version: "9.15", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1285.2", }, { model: "finesse", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.96365", }, { model: "server automation", scope: "eq", trust: 0.3, vendor: "hp", version: "9.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.83", }, { model: "2054-e01", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.816.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.88", }, { model: "enterprise manager", scope: "eq", trust: 0.3, vendor: "f5", version: "2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.13", }, { model: "telepresence tx series", scope: "eq", trust: 0.3, vendor: "cisco", version: "90000", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.393.0", }, { model: "e9000 blade server ch140 v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.362.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.78", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.618.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.628.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.56", }, { model: "big-ip apm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.815.0", }, { model: "aura session manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.423.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.8", }, { model: "system storage san80b-4 2498-b80", scope: null, trust: 0.3, vendor: "ibm", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.802.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.12", }, { model: "big-ip asm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.40", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "26.0.1410.46", }, { model: "message networking", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2.5", }, { model: "big-ip analytics", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2.1", }, { model: "oceanstor s5500t v100r005c02", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v35007.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.323.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.804.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.77", }, { model: "big-ip gtm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.370.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.23", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.22", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.76", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.40", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.203", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.95", }, { model: "espace uc v100r001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.805.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.789.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.21", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.32", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.24", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.315", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.55", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.512.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.109", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.901.0", }, { model: "t520 flexible thin client", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "gaia r75.46", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "aura application server sip core pb23", scope: "eq", trust: 0.3, vendor: "avaya", version: "53002.0", }, { model: "flex system manager", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1285.0", }, { model: "associates api management", scope: "eq", trust: 0.3, vendor: "computer", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.729.0", }, { model: "secureplatform r75.20", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.23", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.102", }, { model: "isoc v200r001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.15", }, { model: "colorqube", scope: "eq", trust: 0.3, vendor: "xerox", version: "8700", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.483.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.467.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.200", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.10", }, { model: "secureplatform r70.50", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.25", }, { model: "message networking", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.2.0", }, { model: "qip", scope: "eq", trust: 0.3, vendor: "alcatel lucent", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.452.1", }, { model: "ssl vpn", scope: "eq", trust: 0.3, vendor: "mcafee", version: "1.5", }, { model: "e9000 blade server ch242 v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1017", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.105", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.727.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.748.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.7", }, { model: "big-ip apm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.89", }, { model: "network security manager", scope: "eq", trust: 0.3, vendor: "mcafee", version: "8.1.73", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.379.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.302.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.76", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.82", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.30", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.654.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.72", }, { model: "oceanstor s5500t v100r005c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4", }, { model: "rack server rh2285h v100r002c", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "3.0.195.25", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.80", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.47", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.32", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.16", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.119", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.57", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.8", }, { model: "message networking", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.73", }, { model: "websphere transformation extender", scope: "eq", trust: 0.3, vendor: "ibm", version: "8.4.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.334.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.862.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.33", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.101", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.37", }, { model: "big-ip psm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.303", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.458.0", }, { model: "security access manager for web", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.0.0.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.721.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.404.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.26", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.90", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.335.0", }, { model: "system storage san384b-2", scope: "eq", trust: 0.3, vendor: "ibm", version: "2499-416", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1030", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.132", }, { model: "uma-db v100r001c00spc302", scope: "ne", trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.51", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.336", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.32", }, { model: "proventia network enterprise scanner", scope: "eq", trust: 0.3, vendor: "ibm", version: "2.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.211", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.602.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.16", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1049.2", }, { model: "2054-e04", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "virtualization provisioning service", scope: "eq", trust: 0.3, vendor: "avaya", version: "1.1", }, { model: "espace usm v100r001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.104", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.72", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.18", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1058.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.79", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.415.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.931.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.115", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.722.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.60", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.32", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.520.0", }, { model: "network security sensor appliance", scope: "eq", trust: 0.3, vendor: "mcafee", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1022", }, { model: "next generation firewall", scope: "eq", trust: 0.3, vendor: "mcafee", version: "5.5.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.651.0", }, { model: "big-iq device", scope: "eq", trust: 0.3, vendor: "f5", version: "4.3", }, { model: "oceanstor s6800t v100r005c02", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.109", }, { model: "aura communication manager utility services sp", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.16.1.0.9.8", }, { model: "secure access link gas", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.476.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.61", }, { model: "network security manager", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.5.58", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.44", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "3.0.195.37", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1055.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1670.1", }, { model: "oceanstor s5600t v100r005c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.354.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.124", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.38", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.222.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.33", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.690.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.75", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.42", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.73", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.64", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.570.0", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v50007.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.22", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.347.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.13", }, { model: "aura presence services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "3.0.195.24", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.90", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.98", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.47", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.44", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.412.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.44", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.27", }, { model: "big-ip analytics", scope: "eq", trust: 0.3, vendor: "f5", version: "11.0.0", }, { model: "vcloud connector", scope: "eq", trust: 0.3, vendor: "vmware", version: "2.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.634.1", }, { model: "pureapplication system", scope: "eq", trust: 0.3, vendor: "ibm", version: "2.0", }, { model: "secureplatform r77.20", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "vsphere management assistant", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.329.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.1", }, { model: "sdn for virtual environments", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.0", }, { model: "network data loss prevention", scope: "eq", trust: 0.3, vendor: "mcafee", version: "9.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1085.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.664.1", }, { model: "gaia r75.40vs", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.26", }, { model: "big-ip apm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.83", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.596.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.32", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.46", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.103", }, { model: "espace cc v100r001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.53", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.113", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.47", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.69", }, { model: "next generation firewall", scope: "eq", trust: 0.3, vendor: "mcafee", version: "5.7.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.730.0", }, { model: "oceanstor s5500t v100r002c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1060.0", }, { model: "oceanstor s6800t v100r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.40", }, { model: "meeting exchange", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.610.0", }, { model: "big-ip webaccelerator", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.422.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.48", }, { model: "oceanstor cse v100r002c00lhwy01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.43", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.24", }, { model: "security access manager for mobile", scope: "eq", trust: 0.3, vendor: "ibm", version: "8.0.0.4", }, { model: "aura application server sip core pb28", scope: "eq", trust: 0.3, vendor: "avaya", version: "53002.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.116", }, { model: "cloud single sign on", scope: "eq", trust: 0.3, vendor: "mcafee", version: "4.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.299.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.31", }, { model: "server automation", scope: "eq", trust: 0.3, vendor: "hp", version: "10.02", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1036.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.41", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.19", }, { model: "big-ip link controller", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2.00", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.371.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.56", }, { model: "secureplatform r75.45", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1668.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.107", }, { model: "vfabric postgres", scope: "eq", trust: 0.3, vendor: "vmware", version: "9.1.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.615.0", }, { model: "telepresence system series", scope: "eq", trust: 0.3, vendor: "cisco", version: "30000", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.599.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.99", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.51", }, { model: "next generation firewall", scope: "eq", trust: 0.3, vendor: "mcafee", version: "5.5.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.452.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.102", }, { model: "ios-xe for catalyst 4k", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.12", }, { model: "oceanstor hvs85t v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "websphere transformation extender", scope: "eq", trust: 0.3, vendor: "ibm", version: "8.44", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.92", }, { model: "system networking san24b-5 2498-f24", scope: null, trust: 0.3, vendor: "ibm", version: null, }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "75250", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1675.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.30", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.50", }, { model: "associates layer mobile access gateway", scope: "eq", trust: 0.3, vendor: "computer", version: "70", }, { model: "telepresence ip gateway series", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "2.0.172.28", }, { model: "oceanstor s5600t v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.873.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.301.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.116", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.366.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.794.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.42", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.40", }, { model: "oceanstor s5600t v200r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.781.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.60", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.34", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1298.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "2.0.157.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.134", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.18", }, { model: "secureplatform r70.1", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.72", }, { model: "oceanstor v100r001c10", scope: "eq", trust: 0.3, vendor: "huawei", version: "9000", }, { model: "secureplatform r71.40", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "power hmc r7.9.0", scope: "eq", trust: 0.3, vendor: "ibm", version: "7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.34", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.554.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.45", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.775.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.59", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.13", }, { model: "security access manager for web", scope: "eq", trust: 0.3, vendor: "ibm", version: "8.08.0.0.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.631.0", }, { model: "ios-xe for asr903", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "network security manager", scope: "eq", trust: 0.3, vendor: "mcafee", version: "8.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.125", }, { model: "move scheduler", scope: "eq", trust: 0.3, vendor: "mcafee", version: "2.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.114", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.102", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.54", }, { model: "ediscovery identification and collection", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.477.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.941.0", }, { model: "scale out network attached storage", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.4.3.4", }, { model: "secureplatform r75", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "linux", scope: "eq", trust: 0.3, vendor: "oracle", version: "5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.65", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.335.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.516.0", }, { model: "qradar security information and event manager", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.2.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.430.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1684.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.37", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.457.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1289.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.48", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1008.0", }, { model: "junos space", scope: "eq", trust: 0.3, vendor: "juniper", version: "0", }, { model: "esx", scope: "eq", trust: 0.3, vendor: "vmware", version: "4.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.943.0", }, { model: "aura communication manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.21", }, { model: "web gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.4.2", }, { model: "aura session manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1.3", }, { model: "aura session manager sp2", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.609.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.114", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364160", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.211.0", }, { model: "ios-xe for isr4400", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.42", }, { model: "t5565 thin client hp t5565z smart client", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "nvp", scope: "eq", trust: 0.3, vendor: "vmware", version: "3.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.342.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.582.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.63", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.589.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.41", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "26.0.1410.43", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.90", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.575.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1671.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1663.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.26", }, { model: "big-ip gtm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.1", }, { model: "media experience engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "message networking sp3", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.356.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.33", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1280.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.84", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.21", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.30", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.122", }, { model: "3722-s52", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.39", }, { model: "vcenter orchestrator appliance", scope: "eq", trust: 0.3, vendor: "vmware", version: "4.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.37", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.95", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.57", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.74", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.61", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.726.0", }, { model: "websphere transformation extender", scope: "eq", trust: 0.3, vendor: "ibm", version: "8.42", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.84", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.667.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.117", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1034.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.81", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "1.0.154.36", }, { model: "algo risk service on cloud", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "oceanstor s5800t v200r002c20", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "gaia embedded r71.30", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.22", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.112", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "3.0.195.32", }, { model: "iq", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.1.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.716.0", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v35006.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.480.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.466.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.45", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.700.0", }, { model: "associates application performance management cloud monitor", scope: "eq", trust: 0.3, vendor: "computer", version: "0", }, { model: "oceanstor s5600t v100r001c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "high-density server dh310 v100r001c00", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.28", }, { model: "aura system platform", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0.3.9.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1684.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.5", }, { model: "oceanstor s6800t v100r002c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "high-density server dh628 v100r001c00", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.466.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.48", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.82", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.21", }, { model: "security access manager for web", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.0.0.7", }, { model: "oceanstor s5800t v200r002c10", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "security access manager for web", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.0.0.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1652.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.6", }, { model: "aura communication manager utility services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.24", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.68", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.627.0", }, { model: "network convergence system series routers", scope: "eq", trust: 0.3, vendor: "cisco", version: "60005.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.466.4", }, { model: "gaia r75.10", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.28", }, { model: "firewall enterprise control center", scope: "eq", trust: 0.3, vendor: "mcafee", version: "5.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.19", }, { model: "e9000 chassis v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "session border controller", scope: "eq", trust: 0.3, vendor: "oracle", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.69", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.826.0", }, { model: "oceanstor hdp3500e v100r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.47", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.581.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.1", }, { model: "secure access link", scope: "eq", trust: 0.3, vendor: "avaya", version: "1.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.544.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.130", }, { model: "ipso r77", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "cloudsystem foundation", scope: "eq", trust: 0.3, vendor: "hp", version: "8.1", }, { model: "ip office application server sp", scope: "eq", trust: 0.3, vendor: "avaya", version: "9.01", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1041", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.42", }, { model: "mds", scope: "eq", trust: 0.3, vendor: "cisco", version: "90000", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.336.0", }, { model: "storeever esl g3 tape library 665h gs12501", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "vcenter server appliance", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.1", }, { model: "associates layer api gateway", scope: "eq", trust: 0.3, vendor: "computer", version: "70", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.124", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.8.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1295.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.67", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.922.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.113", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.65", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.42", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.638.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1049.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.21", }, { model: "big-ip gtm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.56", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.219", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.910.0", }, { model: "big-ip asm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2.00", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.149", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1686.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.90", }, { model: "web gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.3.2.6", }, { model: "firewall enterprise control center", scope: "eq", trust: 0.3, vendor: "mcafee", version: "5.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.69", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.366.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.16", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.46", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1055.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.671.0", }, { model: "bsc6000 v900r008c15", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.84", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.342.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.66", }, { model: "oceanstor s2600 v100r005c02", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.68", }, { model: "big-ip asm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.424.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.37", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "1.0.154.39", }, { model: "enterprise linux server aus", scope: "eq", trust: 0.3, vendor: "redhat", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.898.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.48", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.478.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.107", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.100", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.465.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.540.0", }, { model: "iq", scope: "eq", trust: 0.3, vendor: "avaya", version: "4.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.57", }, { model: "system storage san384b", scope: "eq", trust: 0.3, vendor: "ibm", version: "2499-192", }, { model: "phaser", scope: "eq", trust: 0.3, vendor: "xerox", version: "67000", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.46", }, { model: "ip office application server sp", scope: "eq", trust: 0.3, vendor: "avaya", version: "9.02", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1004.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.136", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.76", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.935.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.821.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.212.1", }, { model: "studio", scope: "eq", trust: 0.3, vendor: "vmware", version: "2.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.45", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.32", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.492.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.42", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.33", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "57550", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.923.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.16", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.547.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.536.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.57", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.41", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.948.0", }, { model: "pureapplication system", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.74", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.30", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.63", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.49", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.114", }, { model: "rack server rh2288h v100r002c", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.223.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1024.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.45", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.784.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.48", }, { model: "oceanstor css v100r001c03", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "0.2.149.30", }, { model: "aura presence services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.44", }, { model: "vsphere storage appliance", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.80", }, { model: "system storage san06b-r 2498-r06", scope: null, trust: 0.3, vendor: "ibm", version: null, }, { model: "business service automation essentials", scope: "eq", trust: 0.3, vendor: "hp", version: "9.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.16", }, { model: "aura experience portal sp2", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v70006.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.16", }, { model: "big-iq cloud", scope: "eq", trust: 0.3, vendor: "f5", version: "4.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.90", }, { model: "fusionmanager v100r003c10cp6001", scope: "ne", trust: 0.3, vendor: "huawei", version: null, }, { model: "unified presence server", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.17", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1017.2", }, { model: "secureplatform r71.40", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "gaia embedded r71.45", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.37", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.92", }, { model: "enterprise linux server aus", scope: "eq", trust: 0.3, vendor: "redhat", version: "6.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.84", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.16", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.95", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.683.0", }, { model: "network security sensor appliance", scope: "eq", trust: 0.3, vendor: "mcafee", version: "8.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.70", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.97", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.425.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.486.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.747.0", }, { model: "oceanstor vis6600t v200r003c10spc100", scope: "ne", trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.450.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.333", }, { model: "websphere process server hypervisor edition for novell suse", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.775.2", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.8.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.9", }, { model: "aura system platform", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.99", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1077.2", }, { model: "studio beta", scope: "eq", trust: 0.3, vendor: "vmware", version: "2.0", }, { model: "qradar risk manager", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.1", }, { model: "storefabric b-series switches", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.27", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1300.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.37", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.17", }, { model: "aura experience portal", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.42", }, { model: "show and share", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "mxe series", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "big-ip link controller", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.32", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.64", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.52", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.889.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1028", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.33", }, { model: "vcloud automation center", scope: "eq", trust: 0.3, vendor: "vmware", version: "6.0", }, { model: "big-ip gtm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.133", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.61", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.773.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.26", }, { model: "aura session manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.2.2", }, { model: "oceanstor s5800t v100r001c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "opensuse", scope: "eq", trust: 0.3, vendor: "s u s e", version: "12.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.64", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.10", }, { model: "storeonce backup", scope: "eq", trust: 0.3, vendor: "hp", version: "3.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.157", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.89", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.739.0", }, { model: "next generation firewall", scope: "eq", trust: 0.3, vendor: "mcafee", version: "5.5.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.22", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.19", }, { model: "vcenter server appliance", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.57", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.404.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.27", }, { model: "operation agent virtual appliance", scope: "eq", trust: 0.3, vendor: "hp", version: "11.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.2491059", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.21", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.2", }, { model: "ios-xe for csr1000v", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.59", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.52", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.25", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.47", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "2.0.159.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18", }, { model: "oceanstor sns5120 v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.101", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.42", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1028.0", }, { model: "aura application server sip core pb5", scope: "eq", trust: 0.3, vendor: "avaya", version: "53003.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.95", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.60", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1013", }, { model: "espace vcn3000 v100r001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.658.0", }, { model: "real-time compression appliance", scope: "eq", trust: 0.3, vendor: "ibm", version: "3.9.1", }, { model: "e9000 chassis v100r001c00spc200", scope: "ne", trust: 0.3, vendor: "huawei", version: null, }, { model: "vcenter server appliance update b", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1023", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.369.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.761.0", }, { model: "cloud services", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.690.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.54", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.103", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.44", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.16", }, { model: "nexus", scope: "eq", trust: 0.3, vendor: "cisco", version: "10100", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.660.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.15", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.511.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1676.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.56", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.50", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.108", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.41", }, { model: "messaging application server", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.137", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1669.1", }, { model: "secure access remote access concentrator", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.587.0", }, { model: "usc invicta series autosupport portal", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.60", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.67", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.437.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.16", }, { model: "enterprise linux server", scope: "eq", trust: 0.3, vendor: "redhat", version: "7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.25", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.321.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.14", }, { model: "secureplatform r71.45", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.24", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.48", }, { model: "nexus switch for nexus series 5.0 u1", scope: "eq", trust: 0.3, vendor: "cisco", version: "1000v3000", }, { model: "smart analytics system", scope: "eq", trust: 0.3, vendor: "ibm", version: "56000", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.65", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.62", }, { model: "fusionaccess v100r005c10spc203", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.101", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.861.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.524.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.717.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.11", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v50007.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.880.0", }, { model: "oceanstor s2600t v100r005c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.607.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.471.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.61", }, { model: "big-ip webaccelerator", scope: "eq", trust: 0.3, vendor: "f5", version: "11.1", }, { model: "big-ip link controller", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.53", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.59", }, { model: "gaia embedded r75.45", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.923.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.37", }, { model: "oceanstor cse v100r002c10", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.450.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.89", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.309.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.232", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.58", }, { model: "big-ip gtm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.778.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.74", }, { model: "email gateway patch", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.03", }, { model: "protectier entry edition", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "horizon daas platform", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.447.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.655.0", }, { model: "operation agent virtual appliance", scope: "eq", trust: 0.3, vendor: "hp", version: "11.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "0.4.154.33", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.115", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.579.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.45", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.0", }, { model: "oceanstor s5600t v100r005c02", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1008", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.116", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.694.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.669.0", }, { model: "ds8000", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1671.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.97", }, { model: "arx", scope: "eq", trust: 0.3, vendor: "f5", version: "6.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.67", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.702.0", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v37007.3", }, { model: "gaia embedded r70.1", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "visualization fault and performance manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "0", }, { model: "one-x client enablement services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1.1", }, { model: "gtsoftx3000 v200r001c01sph106", scope: "ne", trust: 0.3, vendor: "huawei", version: null, }, { model: "esxi", scope: "eq", trust: 0.3, vendor: "vmware", version: "0", }, { model: "big-ip webaccelerator", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.4", }, { model: "big-ip psm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "3.0.190.2", }, { model: "big-ip asm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.0.00", }, { model: "qlogic virtual fabric extension module for ibm bladecenter", scope: "eq", trust: 0.3, vendor: "ibm", version: "9.0.3.05.00", }, { model: "email gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.0.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.400.0", }, { model: "vertica", scope: "eq", trust: 0.3, vendor: "hp", version: "7.1.0", }, { model: "flex system", scope: "eq", trust: 0.3, vendor: "ibm", version: "v70007.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.28", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.62", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.97", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.76", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.74", }, { model: "vsphere data protection", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.60", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.592.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.26", }, { model: "vfabric application director", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.0", }, { model: "storeever esl e-series tape library", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "vds service broker", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.902.0", }, { model: "telepresence multipoint switch", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "aura session manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1", }, { model: "aura application enablement services", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2.2", }, { model: "ipso r70.20", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "enterprise manager", scope: "eq", trust: 0.3, vendor: "f5", version: "2.3", }, { model: "oceanstor s3900 v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "ipso r77.10", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "ip deskphones", scope: "eq", trust: 0.3, vendor: "avaya", version: "96x16.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.444.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.66", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.39", }, { model: "d9036 modular encoding platform", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.15", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.104", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1272.0", }, { model: "fusionstorage dsware v100r003c02spc201", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "secureplatform r75.47", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.548.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.32", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1017.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.954.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.640.0", }, { model: "thinpro", scope: "eq", trust: 0.3, vendor: "hp", version: "4.1", }, { model: "security access manager for web", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.0.0.2", }, { model: "pod orchestration suite", scope: "eq", trust: 0.3, vendor: "avaya", version: "2.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.23", }, { model: "traffix sdc", scope: "eq", trust: 0.3, vendor: "f5", version: "4.0", }, { model: "qradar vulnerability manager", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.73", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.88", }, { model: "oceanstor v100r001c02", scope: "eq", trust: 0.3, vendor: "huawei", version: "v1800", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.18", }, { model: "smart analytics system", scope: "eq", trust: 0.3, vendor: "ibm", version: "77100", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.110", }, { model: "network security manager", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.1.514", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.51", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.759.0", }, { model: "aura experience portal", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0.1", }, { model: "telepresence video communication server", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.587.1", }, { model: "thinpro", scope: "eq", trust: 0.3, vendor: "hp", version: "3.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.84", }, { model: "network security manager", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.5.59", }, { model: "oceanstor s5800t v100r002c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "n series oncommand 6.1r1", scope: null, trust: 0.3, vendor: "ibm", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.42", }, { model: "enterprise linux hpc node", scope: "eq", trust: 0.3, vendor: "redhat", version: "6", }, { model: "esight network v200r003c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "smart analytics system", scope: "eq", trust: 0.3, vendor: "ibm", version: "77000", }, { model: "e6000 blade server bh621 v100r001c00", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.66", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.74", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "2.0.172.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.54", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1305.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.56", }, { model: "big-ip asm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.314.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.69", }, { model: "aura session manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2", }, { model: "cloud identity manager", scope: "eq", trust: 0.3, vendor: "mcafee", version: "3.5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.13", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v37006.3", }, { model: "communication server 1000e signaling server", scope: "eq", trust: 0.3, vendor: "avaya", version: "7.5", }, { model: "aura communication manager utility services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1.0.9.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1661.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.30", }, { model: "thinpro", scope: "eq", trust: 0.3, vendor: "hp", version: "3.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.86", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.662.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.149", }, { model: "gaia r75.47", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "enterprise linux server", scope: "eq", trust: 0.3, vendor: "redhat", version: "5", }, { model: "flashsystem", scope: "eq", trust: 0.3, vendor: "ibm", version: "v8400", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.37", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.77", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.833.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.47", }, { model: "gaia r71.20", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.408.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.119", }, { model: "vcenter hyperic server", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.0", }, { model: "privileged identity manager virtual appliance", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.0.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1281.2", }, { model: "vcenter operations manager", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.8.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.810.0", }, { model: "ipso r75.40vs", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "gaia ngx r65", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.7.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.23", }, { model: "aura application enablement services", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.871.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "2.0.172.31", }, { model: "big-ip link controller", scope: "eq", trust: 0.3, vendor: "f5", version: "11.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.41", }, { model: "system storage san40b-4 2498-b40", scope: null, trust: 0.3, vendor: "ibm", version: null, }, { model: "e6000 chassis v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.54", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1681.0", }, { model: "big-ip psm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.43", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.98", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.88", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.649.0", }, { model: "oneview", scope: "eq", trust: 0.3, vendor: "hp", version: "1.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.78", }, { model: "oceanstor s5600t v100r002c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.354.1", }, { model: "flex system", scope: "eq", trust: 0.3, vendor: "ibm", version: "v70006.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.316.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.114", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.9", }, { model: "iq", scope: "eq", trust: 0.3, vendor: "avaya", version: "5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.90", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "75350", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.19", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.692.0", }, { model: "enterprise manager", scope: "eq", trust: 0.3, vendor: "f5", version: "3.1.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.17", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.7", }, { model: "universal small cell cloudbase", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.83", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11", }, { model: "cloudsystem foundation", scope: "ne", trust: 0.3, vendor: "hp", version: "8.1.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.17", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.68", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.77", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.93", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.639.0", }, { model: "wireless lan wos with aos", scope: "eq", trust: 0.3, vendor: "avaya", version: "91007.0.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.56", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.17", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.58", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.98", }, { model: "quantum son suite", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.630.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.41", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "0.3.154.0", }, { model: "telepresence recording server", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.885.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.52", }, { model: "big-ip webaccelerator", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.1", }, { model: "ipso r71.50", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "oceanstor v100r001c00", scope: "eq", trust: 0.3, vendor: "huawei", version: "18500", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.569.0", }, { model: "workcentre r15-03 spar", scope: "ne", trust: 0.3, vendor: "xerox", version: "7755061.090.225.06200", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.66", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.89", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.962.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.44", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1675.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.306.0", }, { model: "nac guest server", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "big-ip aam", scope: "eq", trust: 0.3, vendor: "f5", version: "11.6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.295.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.75", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.123", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.318.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.44", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.619.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.25", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.14", }, { model: "big-ip asm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.46", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.63", }, { model: "email gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.5.1", }, { model: "communication server 1000m", scope: "eq", trust: 0.3, vendor: "avaya", version: "7.0", }, { model: "t620 flexible quad core thin client", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "network data loss prevention", scope: "eq", trust: 0.3, vendor: "mcafee", version: "9.0", }, { model: "vcloud networking and security", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.1.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.307.6", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "7835", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1004", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.86", }, { model: "nsm3000", scope: "eq", trust: 0.3, vendor: "juniper", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.23", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1033", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.47", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.124", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.100", }, { model: "vpn gateway", scope: "eq", trust: 0.3, vendor: "avaya", version: "3050", }, { model: "secureplatform r71.10", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1044", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.15", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.160", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1679.0", }, { model: "secureplatform r71.45", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "gaia embedded r71", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "7225", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.56", }, { model: "storeonce backup", scope: "eq", trust: 0.3, vendor: "hp", version: "3.11.3", }, { model: "infosphere guardium", scope: "eq", trust: 0.3, vendor: "ibm", version: "8.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.23", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.70", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.51", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.1", }, { model: "big-ip afm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.539.0", }, { model: "e6000 blade server bh622 v100r001c00", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.777.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.661.0", }, { model: "insight control for linux central management", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.106", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.32", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.60", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.91", }, { model: "email gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.0.1", }, { model: "big-ip link controller", scope: "eq", trust: 0.3, vendor: "f5", version: "11.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.105", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.939.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.474.0", }, { model: "information archive", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.68", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.110", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.893.1", }, { model: "audit vault and database firewall", scope: "eq", trust: 0.3, vendor: "oracle", version: "0", }, { model: "vertica", scope: "ne", trust: 0.3, vendor: "hp", version: "7.1.1-0", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.99", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.32", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.42", }, { model: "aura session manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.507.1", }, { model: "vcloud networking and security", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.883.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.41", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.306", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.62", }, { model: "galax8800 v100r003c10cp6001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.348.0", }, { model: "network security manager", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.1.515", }, { model: "life cycle management", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.62", }, { model: "t410 smart zero client", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.86", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.507.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.7", }, { model: "edge digital media player", scope: "eq", trust: 0.3, vendor: "cisco", version: "3400", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.80", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.120", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.18", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.46", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.307.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.935.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.705.0", }, { model: "big-ip psm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1082.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.15", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.122", }, { model: "application dependency planner", scope: "eq", trust: 0.3, vendor: "vmware", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.395.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1016.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.38", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.118", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.776.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1305.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.84", }, { model: "system", scope: "eq", trust: 0.3, vendor: "ibm", version: "x0", }, { model: "system storage san768b-2", scope: "eq", trust: 0.3, vendor: "ibm", version: "2499-816", }, { model: "oceanstor s6800t v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.72", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1075.0", }, { model: "visual quality experience server", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.24", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.33", }, { model: "aura system platform", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.84", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.172", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.20", }, { model: "oceanstor uds v100r002c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.117", }, { model: "solaris", scope: "eq", trust: 0.3, vendor: "oracle", version: "10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.535.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.16", }, { model: "big-ip afm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.443.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.296.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.107", }, { model: "gaia r70.1", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "secure access core concentrator", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.34", }, { model: "esight network v200r003c10", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.18", }, { model: "videoscape distribution suite transparent caching", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.776.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.96379", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.21", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.217", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.40", }, { model: "9710-e08", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "vcenter infrastructure navigator", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.0", }, { model: "network security sensor appliance", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.57", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.114", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1074.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.900.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.126", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.75", }, { model: "junos space ja2500 appliance", scope: "eq", trust: 0.3, vendor: "juniper", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.71", }, { model: "enterprise linux server eus 6.5.z", scope: null, trust: 0.3, vendor: "redhat", version: null, }, { model: "thinpro", scope: "eq", trust: 0.3, vendor: "hp", version: "3.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.611.1", }, { model: "vm virtualbox", scope: "eq", trust: 0.3, vendor: "oracle", version: "2.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.407.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.57", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.17", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.892.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.51", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.29", }, { model: "vsphere big data extensions", scope: "eq", trust: 0.3, vendor: "vmware", version: "2.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.518.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.346.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1658.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.897.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.102", }, { model: "oceanstor css v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.421.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.132", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.55", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.56", }, { model: "aura system platform", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.3", }, { model: "prime lan management solution", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.43", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.27", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.85", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.0", }, { model: "ipso r75.10", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "wide area application services", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vcenter log insight", scope: "eq", trust: 0.3, vendor: "vmware", version: "1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "36.0.1985.143", }, { model: "workload deployer", scope: "eq", trust: 0.3, vendor: "ibm", version: "3.1", }, { model: "security virtual server protection for vmware", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.1.0.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1003.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.382.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.927.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "3.0.195.27", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.23", }, { model: "aura application server sip core", scope: "eq", trust: 0.3, vendor: "avaya", version: "53002.0", }, { model: "storeever esl g3 tape library 671h gs00601", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "server automation", scope: "eq", trust: 0.3, vendor: "hp", version: "10.10", }, { model: "nexus switch for nexus series 4.0 n1", scope: "eq", trust: 0.3, vendor: "cisco", version: "1000v5000", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.16", }, { model: "nac server", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.55", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1021.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.23", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.462.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.21", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.77", }, { model: "aura system platform", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0.3.0.3", }, { model: "aura communication manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.2", }, { model: "vcenter server appliance update", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.51", }, { model: "smart zero core", scope: "eq", trust: 0.3, vendor: "hp", version: "4.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.818.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.37", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.64", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.645.0", }, { model: "big-ip psm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.46", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.4", }, { model: "network security manager", scope: "eq", trust: 0.3, vendor: "mcafee", version: "6.1.1539", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.126", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.23", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1065.0", }, { model: "database appliance", scope: "eq", trust: 0.3, vendor: "oracle", version: "2", }, { model: "storeever esl g3 tape library 663h gs04601", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.37", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.674.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.39", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "57350", }, { model: "hyper-scale manager", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.5.0.58", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.905.0", }, { model: "telepresence system", scope: "eq", trust: 0.3, vendor: "cisco", version: "10000", }, { model: "aura application enablement services", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2.4", }, { model: "thinpro", scope: "eq", trust: 0.3, vendor: "hp", version: "4.4", }, { model: "aura messaging", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "gaia r71.30", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.531.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.23", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.95", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.26", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.84", }, { model: "next generation firewall", scope: "eq", trust: 0.3, vendor: "hp", version: "1.0.34024", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1284.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.115", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.59", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.48", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1040.0", }, { model: "arx", scope: "eq", trust: 0.3, vendor: "f5", version: "6.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.939.0", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v70006.4", }, { model: "secureplatform r77", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.758.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.19", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.49", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.93", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.116", }, { model: "intrusion prevention system solutions", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.37", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.99", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.184", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.154", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.112", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.48", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.42", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.23", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.32", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.344", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.419.0", }, { model: "operations analytics", scope: "eq", trust: 0.3, vendor: "hp", version: "2.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.77", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.672.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.608.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.45", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.66", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "1.0.154.48", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.40", }, { model: "security access manager for web", scope: "eq", trust: 0.3, vendor: "ibm", version: "8.03", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.135", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.675.0", }, { model: "big-ip edge gateway", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.58", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.222.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.124", }, { model: "high-density server dh620 v100r001c00", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "vcloud networking and security", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.1.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.9", }, { model: "web gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.3.2.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1072.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.437.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.102", }, { model: "oceanstor s2600t v200r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "smart zero core", scope: "eq", trust: 0.3, vendor: "hp", version: "4.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.435.0", }, { model: "oceanstor vtl6000 v100r003c02", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.95", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.8", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v50006.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.215", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.63", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.82", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.777.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.617.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.9", }, { model: "storeever esl g3 tape library 655h gs10201", scope: null, trust: 0.3, vendor: "hp", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1019.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "1.0.154.64", }, { model: "security access manager for web", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.0.0.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.71", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.685.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.312", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.30", }, { model: "flex system", scope: "eq", trust: 0.3, vendor: "ibm", version: "v70007.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.110", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.46", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "64", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.63", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.699.0", }, { model: "big-ip wom", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.453.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.961.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.66", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.68", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.202", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "75300", }, { model: "ucs b-series servers", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.32", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.341", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.116", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.57", }, { model: "big-ip afm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1058", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.28", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.70", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.408.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1662.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.49", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1669.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "1.0.154.52", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1054", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.506.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.132", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.16", }, { model: "aura experience portal sp1", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.82", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.168", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.35", }, { model: "big-ip pem", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1286.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.41", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.703.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.668.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.41", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.744.0", }, { model: "big-ip edge gateway", scope: "eq", trust: 0.3, vendor: "f5", version: "11.0", }, { model: "configuration and orchestration manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.74", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "75450", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1078.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.328.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.64", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.24", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.91", }, { model: "sig9800 sig9800-x16 v300r001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.381.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.144", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.102", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1283.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.25", }, { model: "big-ip apm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.3.0", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.711.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.109", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.330", }, { model: "automation insight", scope: "eq", trust: 0.3, vendor: "hp", version: "1.00", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.21", }, { model: "vcenter log insight", scope: "eq", trust: 0.3, vendor: "vmware", version: "2.0", }, { model: "ios-xe for asr1k", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.511.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.61", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.686.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.56", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.147", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.797.0", }, { model: "secureplatform r75.20", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "oic v100r001c00spc403", scope: "ne", trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.14443", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.521.0", }, { model: "vfabric application director", scope: "eq", trust: 0.3, vendor: "vmware", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.46", }, { model: "enterprise linux desktop", scope: "eq", trust: 0.3, vendor: "redhat", version: "7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.68", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.59", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.774.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.19", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.34", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.458.2", }, { model: "business edition", scope: "eq", trust: 0.3, vendor: "cisco", version: "30000", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.46", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.350.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.418.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.50", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.803.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.49", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.41", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.623.0", }, { model: "aura session manager sp1", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.51", }, { model: "big-ip aam", scope: "eq", trust: 0.3, vendor: "f5", version: "11.4.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.21", }, { model: "iq", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.49", }, { model: "aura session manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0.1", }, { model: "cloudsystem enterprise software", scope: "eq", trust: 0.3, vendor: "hp", version: "8.0.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.345.0", }, { model: "secureplatform r71.30", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.215", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.28", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.23", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1001.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.21", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.686.3", }, { model: "big-ip apm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.859.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1674.1", }, { model: "business service automation essentials", scope: "eq", trust: 0.3, vendor: "hp", version: "9.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.930.0", }, { model: "starter kit for cloud", scope: "eq", trust: 0.3, vendor: "ibm", version: "2.2.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.50", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.562.0", }, { model: "gaia embedded r77.20", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "aura system manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1.5", }, { model: "ip office server edition", scope: "eq", trust: 0.3, vendor: "avaya", version: "9.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.37", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.798.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.307.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.227", }, { model: "oceanstor s2600t v100r003c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.302", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.416.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1077.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.63", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.59", }, { model: "dc health check", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.85", }, { model: "enterprise linux long life 5.9.server", scope: null, trust: 0.3, vendor: "redhat", version: null, }, { model: "tssc", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.111", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "7855", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.19", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.647.0", }, { model: "uma v200r001c00spc202", scope: "ne", trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.46", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.937.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.90", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.26", }, { model: "gaia embedded r75", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "oceanstor s5800t v200r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.77", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.277.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.25", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.71", }, { model: "gss 4492r global site selector", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "network security sensor appliance", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.350.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.30", }, { model: "aura application enablement services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.136", }, { model: "t510 flexible thin client", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.27", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.867.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.120", }, { model: "gaia r71.45", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.329", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.25", }, { model: "rack server rh2285 v100r002c0", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.26", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.42", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.746.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.70", }, { model: "thinpro", scope: "eq", trust: 0.3, vendor: "hp", version: "4.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.38", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1287.1", }, { model: "sdn for virtual environments", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.50", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.753.0", }, { model: "chrome beta", scope: "eq", trust: 0.3, vendor: "google", version: "4.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.59", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "26.0.1410.53", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.92", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.42", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.61", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1038.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.288.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.7", }, { model: "nvs v100r002", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "one-x client enablement services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.496.0", }, { model: "manageone v100r001c02", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "smartcloud entry", scope: "eq", trust: 0.3, vendor: "ibm", version: "2.4.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.294.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.109", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.728.0", }, { model: "solaris", scope: "eq", trust: 0.3, vendor: "oracle", version: "11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.65", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.85", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1036.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.706.0", }, { model: "chrome beta", scope: "eq", trust: 0.3, vendor: "google", version: "3.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.824.0", }, { model: "2054-e07", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.28", }, { model: "big-ip afm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.4.1", }, { model: "aura application enablement services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.43", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.453.0", }, { model: "unstructured data identification and mgmt", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.35", }, { model: "ipso r71.30", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.585.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.68", }, { model: "infosphere guardium", scope: "eq", trust: 0.3, vendor: "ibm", version: "9.0", }, { model: "e6000 blade server bh640 v100r001c00", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "big-ip ltm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.557.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.91", }, { model: "smart zero core", scope: "eq", trust: 0.3, vendor: "hp", version: "4.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.80", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.15", }, { model: "message networking sp1", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.85", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.549.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.88", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.466.5", }, { model: "thinpro", scope: "eq", trust: 0.3, vendor: "hp", version: "2.0", }, { model: "solaris", scope: "eq", trust: 0.3, vendor: "oracle", version: "8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.111", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.314.1", }, { model: "boot attestation service", scope: "eq", trust: 0.3, vendor: "mcafee", version: "3.0", }, { model: "vcloud director appliance", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.0", }, { model: "global threat intelligence proxy", scope: "eq", trust: 0.3, vendor: "mcafee", version: "2.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.207", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.440.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.343.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1053.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.957.0", }, { model: "nexus", scope: "eq", trust: 0.3, vendor: "cisco", version: "60000", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.52", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.573.0", }, { model: "high-density server dh320 v100r001c00", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1055", }, { model: "espace dcm v100r002", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.22", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.54", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.806.0", }, { model: "enterprise linux server eus 6.4.z", scope: null, trust: 0.3, vendor: "redhat", version: null, }, { model: "oceanstor v100r001c00", scope: "eq", trust: 0.3, vendor: "huawei", version: "18800", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.67", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.356.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.863.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.652.0", }, { model: "oceanstor s2600t v100r005c02", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.29", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.52", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.86", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.5", }, { model: "exalytics", scope: "eq", trust: 0.3, vendor: "oracle", version: "0", }, { model: "oneview", scope: "eq", trust: 0.3, vendor: "hp", version: "1.01", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.87", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.18", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "26.0.1410.28", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.33", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.719.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.952.0", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.8.2", }, { model: "secureplatform r75.45", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.401.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.495.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1019", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.872.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.57", }, { model: "one-x client enablement services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.2", }, { model: "communication server 1000m", scope: "eq", trust: 0.3, vendor: "avaya", version: "7.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1022.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.28", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.153", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.341.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.11", }, { model: "pureapplication system", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.0", }, { model: "websphere transformation extender", scope: "eq", trust: 0.3, vendor: "ibm", version: "8.4.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.223", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1657.0", }, { model: "espace ums v200r002", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.54", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.41", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.56", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.78", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1273.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.66", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "1.0.154.46", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.75", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.77", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1274.0", }, { model: "communication server 1000m signaling server", scope: "eq", trust: 0.3, vendor: "avaya", version: "7.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.954.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1056.0", }, { model: "oceanstor s6800e v100r005c02", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1303.0", }, { model: "aura system platform", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0.3.8.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1015", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.38", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.714.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.8", }, { model: "server automation", scope: "eq", trust: 0.3, vendor: "hp", version: "9.13", }, { model: "communication server 1000e", scope: "eq", trust: 0.3, vendor: "avaya", version: "7.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.418.6", }, { model: "system storage storwize unified", scope: "eq", trust: 0.3, vendor: "ibm", version: "v70001.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.22", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.19", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.150", }, { model: "secureplatform r70.1", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13", }, { model: "big-ip edge gateway", scope: "eq", trust: 0.3, vendor: "f5", version: "11.4.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.230", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.67", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.30", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.942.0", }, { model: "gaia embedded r70", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.4", }, { model: "aura application server sip core pb19", scope: "eq", trust: 0.3, vendor: "avaya", version: "53002.0", }, { model: "big-ip pem", scope: "eq", trust: 0.3, vendor: "f5", version: "11.6.0", }, { model: "oceanstor s5600t v100r005c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.50", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.49", }, { model: "prime ip express", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.342.7", }, { model: "esx", scope: "eq", trust: 0.3, vendor: "vmware", version: "4.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.60", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375125", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.100", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.128", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.720.0", }, { model: "healthanalyzer", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.114", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.904.0", }, { model: "gaia r77", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "aura system platform", scope: "eq", trust: 0.3, vendor: "avaya", version: "1.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.222.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.28", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.212", }, { model: "enterprise linux server aus", scope: "eq", trust: 0.3, vendor: "redhat", version: "6.4", }, { model: "oceanstor s5900 v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.94", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.100", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.56", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.500.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.116", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.55", }, { model: "strm/jsa", scope: "eq", trust: 0.3, vendor: "juniper", version: "2013.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.95", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.22", }, { model: "autobackup server", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.54", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.85", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.69", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1659.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1052.0", }, { model: "videoscape conductor", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "communication server 1000m", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.305.0", }, { model: "high-density server xh310 v100r001c00", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.89", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1034", }, { model: "web gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.2.0.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.145", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.646.0", }, { model: "websphere transformation extender", scope: "eq", trust: 0.3, vendor: "ibm", version: "8.43", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.911.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.697.0", }, { model: "asa cx and cisco prime security manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.222", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.593.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.49", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.0", }, { model: "aura session manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.667.2", }, { model: "message networking", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2.2", }, { model: "iq", scope: "eq", trust: 0.3, vendor: "avaya", version: "4.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.86", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.41", }, { model: "quantum virtualized packet core", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.7", }, { model: "communication server 1000m signaling server", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.120", }, { model: "network data loss prevention", scope: "eq", trust: 0.3, vendor: "mcafee", version: "9.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.79", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.100", }, { model: "hosted collaboration mediation fulfillment", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.928.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.20", }, { model: "aura messaging", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.38", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.339.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1060.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.70", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.626.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.307.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1031.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.80", }, { model: "standalone rack server cimc", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.37", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.708.0", }, { model: "information archive", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.559.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.56", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.625.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.64", }, { model: "big-ip wom", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2", }, { model: "e9000 blade server ch240 v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "oceanstor 9000e v100r001c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1009.0", }, { model: "oceanstor css v100r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v35006.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.223.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.32", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.326", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1062.1", }, { model: "hyperdp oceanstor n8500 v200r001c09", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.18", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.203", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.881.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.800.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.680.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.659.0", }, { model: "aura system platform", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.37599", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.330.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.84", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.2", }, { model: "aura experience portal", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.26", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.93", }, { model: "power hmc r7.6.0", scope: "eq", trust: 0.3, vendor: "ibm", version: "7", }, { model: "rack server rh1288 v100r002c0", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.53", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.58", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1001", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.18", }, { model: "telepresence system", scope: "eq", trust: 0.3, vendor: "cisco", version: "11000", }, { model: "big-ip asm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2.1", }, { model: "big-iq cloud", scope: "eq", trust: 0.3, vendor: "f5", version: "4.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.70", }, { model: "tam data manager", scope: "eq", trust: 0.3, vendor: "vmware", version: "0", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.10.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1056", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.33", }, { model: "linux lts", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "14.04", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.96", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.768.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.82", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.38", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.40", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.871.0", }, { model: "gaia embedded r76", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "9710-e01", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "qradar security information and event manager", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.2.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.80", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "2.0.172.37", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1010.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.35", }, { model: "oceanstor hvs85t v100r001c99", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1304.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.61", }, { model: "vm virtualbox", scope: "eq", trust: 0.3, vendor: "oracle", version: "3.1", }, { model: "ipso r75.46", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "flex system", scope: "eq", trust: 0.3, vendor: "ibm", version: "v70006.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.670.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.378.0", }, { model: "big-ip afm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.27", }, { model: "qlogic gb intelligent pass-thru module for ibm bladecenter", scope: "eq", trust: 0.3, vendor: "ibm", version: "87.10.1.29", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.551.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1281.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1037", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.38", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.23", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.466.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.611.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1060", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.126", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.547.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.300.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.509.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.57", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.387.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.27", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.382.3", }, { model: "vcenter site recovery manager", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.1.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.290.0", }, { model: "oceanstor s5500t v100r001c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "7970", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.50", }, { model: "gaia os r75.0", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "nsx for multi-hypervisor", scope: "eq", trust: 0.3, vendor: "vmware", version: "4.1.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.33", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.386.0", }, { model: "tssc", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.3.15", }, { model: "aura system manager sp1", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1056.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1670.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.839.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.57", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.45", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.48", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.63", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1281.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.21", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1277.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.38", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.764.0", }, { model: "smartcloud provisioning fixpack for sv", scope: "eq", trust: 0.3, vendor: "ibm", version: "2.15", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.67", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.97", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.616.0", }, { model: "identity services engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.7.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.66", }, { model: "big-ip gtm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.90", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.105", }, { model: "nexus intercloud for vmware", scope: "eq", trust: 0.3, vendor: "cisco", version: "1000v0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "0.4.154.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.22", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.45", }, { model: "aura session manager sp1", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.777.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.53", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.42", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.71", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.564.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.46", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1046", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.50", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1081.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.868.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.19", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.54", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.220", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.44", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.2", }, { model: "aura session manager sp2", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.42", }, { model: "network security manager", scope: "eq", trust: 0.3, vendor: "mcafee", version: "8.1.72", }, { model: "oceanstor s6800t v100r005c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "colorqube", scope: "eq", trust: 0.3, vendor: "xerox", version: "9302", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.397.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.70", }, { model: "secureplatform r70.30", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.99", }, { model: "oceanstor n8000 oceanstor s2300", scope: "eq", trust: 0.3, vendor: "huawei", version: "v100", }, { model: "prime collaboration provisioning", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "digital media manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.70", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.85", }, { model: "security access manager for enterprise single sign-on", scope: "eq", trust: 0.3, vendor: "ibm", version: "8.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.47", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.7", }, { model: "move antivirus multi-platform", scope: "eq", trust: 0.3, vendor: "mcafee", version: "2.0", }, { model: "ib6131 40gb infiniband switch", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.491.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.74", }, { model: "exadata storage server software", scope: "eq", trust: 0.3, vendor: "oracle", version: "0", }, { model: "nsm3000 appliances", scope: "eq", trust: 0.3, vendor: "juniper", version: "2012.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1054.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1017.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.535.1", }, { model: "espace u2990 v200r001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1289.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.58", }, { model: "big-ip edge gateway", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.825.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.814.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.600.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.15", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.566.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.132", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.137", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.877.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.860.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.19", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.475.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.60", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1070.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.102", }, { model: "aura application enablement services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1.1", }, { model: "aura conferencing standard edition", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "solaris", scope: "eq", trust: 0.3, vendor: "oracle", version: "11.2", }, { model: "local collector appliance", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.6.8", }, { model: "vfabric postgres", scope: "eq", trust: 0.3, vendor: "vmware", version: "9.2.4", }, { model: "aura system manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.958.1", }, { model: "gaia r77.20", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.92", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "65", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.94", }, { model: "server automation", scope: "eq", trust: 0.3, vendor: "hp", version: "9.16", }, { model: "vcloud networking and security", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.5.3", }, { model: "vcenter server appliance update", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.11", }, { model: "security access manager for mobile", scope: "eq", trust: 0.3, vendor: "ibm", version: "8.0.0.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.34", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.31", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v37006.4", }, { model: "oceanstor s8100 v100r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.415.1", }, { model: "big-ip ltm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2", }, { model: "gaia embedded r70.50", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.108", }, { model: "big-ip apm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.4.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.32", }, { model: "vcenter application discovery manager", scope: "eq", trust: 0.3, vendor: "vmware", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1020.0", }, { model: "enterprise linux els", scope: "eq", trust: 0.3, vendor: "redhat", version: "4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.614.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.57", }, { model: "gaia embedded r70.20", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.16", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.86", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.50", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.344.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.307.9", }, { model: "move antivirus multi-platform", scope: "eq", trust: 0.3, vendor: "mcafee", version: "3.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.34", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.62", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.235", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.16", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "2.0.156.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.111", }, { model: "flashsystem", scope: "eq", trust: 0.3, vendor: "ibm", version: "8400", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.18", }, { model: "unified ip phone", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.715.0", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.9.5", }, { model: "workcentre spar", scope: "ne", trust: 0.3, vendor: "xerox", version: "7535061.121.225.06100", }, { model: "service control engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "80000", }, { model: "secureplatform r75.40vs", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "t620 flexible dual core thin client", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "oceanstor s6800t v100r005c50", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "aura system manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.17", }, { model: "websphere transformation extender", scope: "eq", trust: 0.3, vendor: "ibm", version: "8.41", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.55", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.505.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1063.0", }, { model: "aura system manager sp3", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.286.0", }, { model: "big-iq security", scope: "eq", trust: 0.3, vendor: "f5", version: "4.0", }, { model: "gaia embedded r71.40", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "oceanstor vis6600t v200r003c10", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.27", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.33", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.15", }, { model: "vcloud automation center application services", scope: "eq", trust: 0.3, vendor: "vmware", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.723.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.105", }, { model: "big-ip link controller", scope: "eq", trust: 0.3, vendor: "f5", version: "11.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.134", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.725.0", }, { model: "oceanstor 9000e v100r002c19", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "storefabric h-series switches", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "telepresence conductor", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.224", }, { model: "ipso r70.30", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "email gateway patch", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.51", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.8", }, { model: "systems insight manager", scope: "eq", trust: 0.3, vendor: "hp", version: "7.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.52", }, { model: "flex system", scope: "eq", trust: 0.3, vendor: "ibm", version: "v70007.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.672.0", }, { model: "vm virtualbox", scope: "eq", trust: 0.3, vendor: "oracle", version: "3.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.358.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.151", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.2", }, { model: "vcenter infrastructure navigator", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.52", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.37", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.22", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.223.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.107", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.754.0", }, { model: "ipso r75", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.58", }, { model: "big-ip ltm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.24", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.73", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1007", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1659.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.783.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.19", }, { model: "ios-xr", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1047", }, { model: "flex system", scope: "eq", trust: 0.3, vendor: "ibm", version: "v70006.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1052", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.78", }, { model: "gaia r70.30", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.51", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1690.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.17", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.687.1", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.8.5", }, { model: "web gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.3.2.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.308", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.820.0", }, { model: "associates user activity reporting module", scope: "eq", trust: 0.3, vendor: "computer", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.46", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1044.0", }, { model: "linux powerpc", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "10.04", }, { model: "big-ip link controller", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.109", }, { model: "big-ip apm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2", }, { model: "infosphere balanced warehouse c3000", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v35006.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.432.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.731.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.249.89", }, { model: "message networking", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.560.0", }, { model: "virtualization performance viewer", scope: "eq", trust: 0.3, vendor: "hp", version: "2.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.80", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.819.0", }, { model: "aura system platform", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.324.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.28", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1048", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.125", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1032.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.162", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.29", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.433.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.117", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.80", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.201", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.612.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.27", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.94", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.52", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.153", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "0.4.154.18", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.201", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1687.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.22", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.903.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.51", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.672.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.733.0", }, { model: "gaia r76", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "vsphere storage appliance", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.1.3", }, { model: "t610 plus flexible thin client", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.749.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.48", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.113", }, { model: "ediscovery identification and collection", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.37", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.762.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.48", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.719.0", }, { model: "siem enterprise security manager", scope: "eq", trust: 0.3, vendor: "mcafee", version: "9.2", }, { model: "traffix sdc", scope: "eq", trust: 0.3, vendor: "f5", version: "4.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.12", }, { model: "communication server 1000e signaling server", scope: "eq", trust: 0.3, vendor: "avaya", version: "7.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.72", }, { model: "secureplatform r70.40", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "enterprise manager", scope: "eq", trust: 0.3, vendor: "f5", version: "3.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.271.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.813.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.7", }, { model: "oceanstor dorado5100 v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.237", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.38", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.53", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.28", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.211", }, { model: "oceanstor s2600t v100r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.673.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.622.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.106", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1063.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.187", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1055.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.383.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.790.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.465.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.77", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.51", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.319", }, { model: "esight uc&c v100r001c20", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "meeting exchange", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.33", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.24", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.658.1", }, { model: "vcenter server appliance patch", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.8", }, { model: "fusionmanager v100r003c10", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1668.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.37", }, { model: "big-ip psm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.1", }, { model: "secureplatform r70.30", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.89", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.80", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.932.0", }, { model: "flex system manager", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.3.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.101", }, { model: "oceanstor s6800t v100r005c30", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.34", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "3.0.195.21", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.34", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.41", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.23", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1064.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.686.0", }, { model: "power hmc r7.8.0", scope: "eq", trust: 0.3, vendor: "ibm", version: "7", }, { model: "vcenter converter standalone", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.24", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1651.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.6", }, { model: "espace u2990 v200r001c10spc102", scope: "ne", trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1003.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.45", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.322.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.49", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.114", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.391.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.107", }, { model: "aura session manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1664.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.40", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.18", }, { model: "big-ip aam", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5", }, { model: "ios-xe for catalyst air-ct5760", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "virtual pgw softswitch", scope: "eq", trust: 0.3, vendor: "cisco", version: "22000", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "7238", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.2", }, { model: "video surveillance media server", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.81", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.47", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.755.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1031", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.49", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.18", }, { model: "linux", scope: "eq", trust: 0.3, vendor: "oracle", version: "4", }, { model: "pod orchestration suite", scope: "eq", trust: 0.3, vendor: "avaya", version: "1.0", }, { model: "elog v100r003c01spc506", scope: "ne", trust: 0.3, vendor: "huawei", version: null, }, { model: "big-ip psm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1007.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.40", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.326.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.22", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.62", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1680.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.11", }, { model: "security access manager for web", scope: "eq", trust: 0.3, vendor: "ibm", version: "8.0.0.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.603.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.307.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.76", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.686.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.213", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.23", }, { model: "emergency responder", scope: "eq", trust: 0.3, vendor: "cisco", version: "1.1", }, { model: "big-ip asm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.3.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.32", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.79", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1010", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.113", }, { model: "web gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.3.28", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.337", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.51", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.28", }, { model: "intelligent automation for cloud", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "websphere process server hypervisor edition", scope: "eq", trust: 0.3, vendor: "ibm", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.38", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.1", }, { model: "workcentre spar", scope: "ne", trust: 0.3, vendor: "xerox", version: "7530061.121.225.06100", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.15", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.29", }, { model: "big-iq device", scope: "eq", trust: 0.3, vendor: "f5", version: "4.2", }, { model: "vm virtualbox", scope: "eq", trust: 0.3, vendor: "oracle", version: "3.3", }, { model: "phaser", scope: "eq", trust: 0.3, vendor: "xerox", version: "78000", }, { model: "real-time compression appliance", scope: "eq", trust: 0.3, vendor: "ibm", version: "4.1.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.33", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.37", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.8.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1051", }, { model: "one-x client enablement services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.78", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.98", }, { model: "oceanstor s5500t v100r003c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "telepresence te software", scope: "eq", trust: 0.3, vendor: "cisco", version: "-0", }, { model: "secureplatform r71.20", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.112", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.87", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.119", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.45", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.64", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.896.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.26", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.59", }, { model: "secureplatform r71", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "secureplatform r70.20", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "socialcast on premise", scope: "eq", trust: 0.3, vendor: "vmware", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.152", }, { model: "e6000 blade server bh620 v100r002c00", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.417.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.86", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.218", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.334", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.26", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.657.0", }, { model: "ip deskphone", scope: "eq", trust: 0.3, vendor: "avaya", version: "96x16", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.342.0", }, { model: "isoc v200r001c02spc203", scope: "ne", trust: 0.3, vendor: "huawei", version: "9000", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.418.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1049", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "7242", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.331", }, { model: "secureplatform r71.50", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.667.4", }, { model: "aura session manager sp1", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2", }, { model: "aura communication manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.1", }, { model: "colorqube", scope: "eq", trust: 0.3, vendor: "xerox", version: "9393", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1057", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1673.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.689.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.55", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.152", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.55", }, { model: "qradar incident forensics mr2", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1288.0", }, { model: "gtsoftx3000 v200r001c01spc100", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.390.0", }, { model: "rack server rh2485 v100r002c0", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1655.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.707.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.42", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.34", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.76", }, { model: "secureplatform r70.20", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "nac appliance", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "gaia r75.45", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "algo one managed data service on cloud", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.38", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1081.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.44", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.92", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.50", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1011.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1067.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.72", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.44", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.536.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1664.1", }, { model: "meeting exchange", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "oceanstor vis6600 v100r002c02", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.801.0", }, { model: "nexus running nxos", scope: "eq", trust: 0.3, vendor: "cisco", version: "90000", }, { model: "horizon workspace", scope: "eq", trust: 0.3, vendor: "vmware", version: "2.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1048.0", }, { model: "aura system platform", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.69", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.46", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.807.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.307.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.72", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.94", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.87", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.865.0", }, { model: "espace cad v100r001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.86", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1296.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.481.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.489.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.9", }, { model: "vcenter converter standalone", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.55", }, { model: "ipso r75.30", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.121", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.97", }, { model: "media experience engines", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "elog v200r003", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "server automation", scope: "eq", trust: 0.3, vendor: "hp", version: "9.1", }, { model: "workcentre spar", scope: "ne", trust: 0.3, vendor: "xerox", version: "7556061.121.225.06100", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.69", }, { model: "enterprise content delivery service", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.47", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.69", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.91", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.408.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.43", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.50", }, { model: "network security manager", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.1.510", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.16", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.96", }, { model: "aura system manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.8", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "77750", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.572.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.29", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.356.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1055.0", }, { model: "big-ip edge gateway", scope: "eq", trust: 0.3, vendor: "f5", version: "11.1", }, { model: "ipso r75.47", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.93", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.40", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.786.0", }, { model: "mediasense", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "36.0.1985.122", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.20", }, { model: "virtualization performance viewer", scope: "eq", trust: 0.3, vendor: "hp", version: "1.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.59", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.9.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1039.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.836.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.447.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.23", }, { model: "oceanstor dorado2100 v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.642.1", }, { model: "ace application control engine module for the cisco catalyst", scope: "eq", trust: 0.3, vendor: "cisco", version: "6500", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.216", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.408.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.591.0", }, { model: "flex system 40gb ethernet", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.408.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.107", }, { model: "secureplatform ngx r65", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "aura system manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1.1", }, { model: "mac os", scope: "ne", trust: 0.3, vendor: "apple", version: "x10.11", }, { model: "cloudsystem foundation", scope: "eq", trust: 0.3, vendor: "hp", version: "8.0.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.79", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.24", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1012.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.92", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.278.0", }, { model: "pod orchestration suite", scope: "eq", trust: 0.3, vendor: "avaya", version: "1.0.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.74", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.413.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.76", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.95", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v35007.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.25", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.67", }, { model: "smart zero core", scope: "eq", trust: 0.3, vendor: "hp", version: "4.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.580.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.81", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.123", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.146", }, { model: "big-ip edge gateway", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.4", }, { model: "arx", scope: "eq", trust: 0.3, vendor: "f5", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1305.4", }, { model: "chrome", scope: "ne", trust: 0.3, vendor: "google", version: "38.0.2125.101", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.24", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.513.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.3", }, { model: "insight control", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "0.2.149.29", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "2.0.172.30", }, { model: "big-ip wom", scope: "eq", trust: 0.3, vendor: "f5", version: "11.1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.3", }, { model: "big-ip gtm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2", }, { model: "nsmexpress", scope: "eq", trust: 0.3, vendor: "juniper", version: null, }, { model: "secure access link", scope: "eq", trust: 0.3, vendor: "avaya", version: "2.0", }, { model: "aura messaging", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.21", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1042", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "2.0.158.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.761.1", }, { model: "oceanstor sns2120 v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.49", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.30", }, { model: "linux", scope: "eq", trust: 0.3, vendor: "oracle", version: "6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.45", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.130", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.765.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.100", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.75", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.53", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "1.0.154.53", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.553.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.494.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.745.0", }, { model: "ipso r71", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.484.0", }, { model: "vsphere big data extensions", scope: "eq", trust: 0.3, vendor: "vmware", version: "1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.15", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v37006.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.52", }, { model: "oceanstor cse v100r003c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.25", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1061.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.829.1", }, { model: "oceanstor hvs88t v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "2.0.172.27", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.360.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.35", }, { model: "traffix sdc", scope: "eq", trust: 0.3, vendor: "f5", version: "4.0.5", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.10.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.482.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.18", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.32", }, { model: "aura communication manager ssp1", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2.1", }, { model: "telepresence te software", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "ipso r70.40", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "prime collaboration deployment", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1309.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.76", }, { model: "vcenter support assistant", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.5", }, { model: "enterprise linux workstation", scope: "eq", trust: 0.3, vendor: "redhat", version: "6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.677.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "3.0.195.38", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.27", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.33", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.890.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.437.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.770.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.30", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.364.0", }, { model: "enterprise linux desktop client", scope: "eq", trust: 0.3, vendor: "redhat", version: "5", }, { model: "c-series nexus 5k switches", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.507.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.349.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.69", }, { model: "unified computing system b-series servers", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "studio", scope: "eq", trust: 0.3, vendor: "vmware", version: "2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.450.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.58", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.52", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.322.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.37", }, { model: "workbench", scope: "eq", trust: 0.3, vendor: "vmware", version: "3.0", }, { model: "application and content networking system", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.7.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.15", }, { model: "system storage san48b-5 2498-f48", scope: null, trust: 0.3, vendor: "ibm", version: null, }, { model: "gaia r70.20", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.70", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.83", }, { model: "gaia r77.10", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "7845", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.17", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.95", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.63", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "75560", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.89", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.37", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1297.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.23", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1026", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.53", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1068.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "3.0.195.33", }, { model: "secureplatform r71", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "aura presence services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.10", }, { model: "fusionstorage dsware v100r003c02spc200", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.762.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.369.1", }, { model: "services provisioning platform", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "digital media manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "privileged identity manager virtual appliance", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.0.1.1", }, { model: "secureplatform r75.40", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "power hmc r7.3.0", scope: "eq", trust: 0.3, vendor: "ibm", version: "7", }, { model: "web gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.4.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.66", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.723.1", }, { model: "websphere process server hypervisor edition for red hat", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.0", }, { model: "big-ip aam", scope: "eq", trust: 0.3, vendor: "f5", version: "11.4.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.83", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.34", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.103", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.884.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.16", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1038", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.62", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.83", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1068.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.42", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.621.0", }, { model: "vcloud networking and security", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.310", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.14", }, { model: "espace v1300n v1300n v100r002", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.36", }, { model: "smartcloud provisioning fixpack for sv", scope: "eq", trust: 0.3, vendor: "ibm", version: "2.12", }, { model: "puredata system for transactions", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1006", }, { model: "smartcloud provisioning fixpack interi", scope: "eq", trust: 0.3, vendor: "ibm", version: "2.14", }, { model: "web gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.3.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.811.0", }, { model: "big-ip edge gateway", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.34", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.499.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.106", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.709.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.43", }, { model: "aura application enablement services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.96", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.54", }, { model: "oceanstor uds v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.882.0", }, { model: "telepresence system", scope: "eq", trust: 0.3, vendor: "cisco", version: "13000", }, { model: "enterprise linux eus 5.9.z server", scope: null, trust: 0.3, vendor: "redhat", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.68", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1002.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.384.0", }, { model: "secureplatform r75.40", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "gaia r70.40", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.59", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.29", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "26.0.1410.63", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.111", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.408.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.118", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.19", }, { model: "telepresence exchange system", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "2.0.157.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.44", }, { model: "power hmc r7.7.0", scope: "eq", trust: 0.3, vendor: "ibm", version: "7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.134", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.721.1", }, { model: "cms r17", scope: null, trust: 0.3, vendor: "avaya", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.74", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.23", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "1.0.154.61", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.46", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.68", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.76", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.54", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.529.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.750.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.503.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.563.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.88", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.24", }, { model: "2417-c48", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "chrome beta", scope: "eq", trust: 0.3, vendor: "google", version: "3.0.193.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.771.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.603.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.59", }, { model: "enterprise s-jis service", scope: "eq", trust: 0.3, vendor: "redhat", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.43", }, { model: "diagnostic server", scope: "eq", trust: 0.3, vendor: "avaya", version: "1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.408.8", }, { model: "oceanstor s5500 v100r005c02", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "ipso r77.20", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.10.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.906.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.24", }, { model: "vsphere replication", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.6", }, { model: "big-ip edge gateway", scope: "eq", trust: 0.3, vendor: "f5", version: "10.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "2.0.169.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.114", }, { model: "linux arm", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "10.04", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.202", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v70007.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.86", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.363.0", }, { model: "vfabric postgres", scope: "eq", trust: 0.3, vendor: "vmware", version: "9.2.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.60", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.601.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1306.0", }, { model: "smartcloud provisioning fixpack for sv", scope: "eq", trust: 0.3, vendor: "ibm", version: "2.14", }, { model: "information archive", scope: "eq", trust: 0.3, vendor: "ibm", version: "2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.223.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "3.0.195.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.52", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.812.0", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "7245", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.944.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.635.0", }, { model: "onepk all-in-one vm", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "workcentre spar", scope: "ne", trust: 0.3, vendor: "xerox", version: "7525061.121.225.06100", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.89", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "77550", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "5955", }, { model: "oceanstor s3900 v100r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "network security manager", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.1.156", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.96", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.21", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1660.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1047.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1036.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.44", }, { model: "aura communication manager ssp3", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.473.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.441.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1012.1", }, { model: "aura conferencing", scope: "eq", trust: 0.3, vendor: "avaya", version: "8.0", }, { model: "big-ip ltm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.1.0", }, { model: "oceanstor s5500t v100r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1040", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1037.0", }, { model: "aura application enablement services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.104", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.0", }, { model: "system storage storwize unified", scope: "eq", trust: 0.3, vendor: "ibm", version: "v70001.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.47", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.53", }, { model: "communication server 1000e signaling server", scope: "eq", trust: 0.3, vendor: "avaya", version: "7.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.426.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.752.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.43", }, { model: "big-ip edge gateway", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.5", }, { model: "oceanstor n8500 v100r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.834.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.327.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1654.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.94", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.49", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.112", }, { model: "aix", scope: "eq", trust: 0.3, vendor: "ibm", version: "6.1", }, { model: "aura system manager sp2", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1", }, { model: "oceanstor s5800t v100r005c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "t410 all-in-one rfx/hdx smart zc", scope: "eq", trust: 0.3, vendor: "hp", version: "18.50", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.401.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.15", }, { model: "webex node", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.112", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.49", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.493.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.216", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.103", }, { model: "email gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.327", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.186", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.10", }, { model: "ipso ngx r65", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "smartcloud entry", scope: "eq", trust: 0.3, vendor: "ibm", version: "3.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.956.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1662.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.49", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.92", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.217", }, { model: "ip office server edition", scope: "eq", trust: 0.3, vendor: "avaya", version: "8.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.2491036", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.56", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.108", }, { model: "horizon workspace", scope: "eq", trust: 0.3, vendor: "vmware", version: "1.8.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.7", }, { model: "message networking", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2", }, { model: "system storage san768b", scope: "eq", trust: 0.3, vendor: "ibm", version: "2499-384", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.522.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.29", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.30", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.38", }, { model: "data center analytics framework", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "scale out network attached storage", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.4.3.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.48", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.23", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.94", }, { model: "network data loss prevention", scope: "eq", trust: 0.3, vendor: "mcafee", version: "9.2.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.17", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1305.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.22", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.30", }, { model: "aura system platform", scope: "eq", trust: 0.3, vendor: "avaya", version: "1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.622.1", }, { model: "fusioncompute v100r003c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.91", }, { model: "digital media players", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.15", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.159", }, { model: "big-ip pem", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5.1", }, { model: "mirage gateway", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.25", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1062.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "0.2.152.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.556.0", }, { model: "oceanstor vtl3500 v100r002c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.53", }, { model: "identity engines ignition server sp", scope: "eq", trust: 0.3, vendor: "avaya", version: "9.0.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.450.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.119", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.161", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.772.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.322.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.125", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1059.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.29", }, { model: "ipso r70", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.398.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.32", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.404.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.140", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.531.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.82", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.53", }, { model: "big-ip analytics", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.321", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.94", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.45", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.41", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.870.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1006.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.91", }, { model: "vsphere replication", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.5.1", }, { model: "next generation firewall", scope: "eq", trust: 0.3, vendor: "hp", version: "1.14127", }, { model: "secure access remote access concentrator", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1653.1", }, { model: "virtualization experience client", scope: "eq", trust: 0.3, vendor: "cisco", version: "62150", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.66", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.204", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.58", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.551.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.18", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1083.0", }, { model: "nexus virtual supervisor module", scope: "eq", trust: 0.3, vendor: "cisco", version: "10000", }, { model: "aix", scope: "eq", trust: 0.3, vendor: "ibm", version: "5.3", }, { model: "communication server 1000e", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.301", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.335", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.10.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.695.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1021", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1688.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.325", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.24", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.732.0", }, { model: "video distribution suite for internet streaming vds-is", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.50", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.58", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1290.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.26", }, { model: "vcloud usage meter", scope: "eq", trust: 0.3, vendor: "vmware", version: "3.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.712.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1286.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.98", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.558.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.28", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.342.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.822.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.40", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.120", }, { model: "email gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.0.2", }, { model: "big-ip analytics", scope: "eq", trust: 0.3, vendor: "f5", version: "11.6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.665.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.629.0", }, { model: "big-ip psm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2", }, { model: "next generation firewall", scope: "eq", trust: 0.3, vendor: "hp", version: "1.0.13974", }, { model: "oceanstor s5800t v200r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "security virtual server protection for vmware", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.1.1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1012.0", }, { model: "thinpro", scope: "eq", trust: 0.3, vendor: "hp", version: "1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.339", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.109", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.335.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.15", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.763.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.41", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.112", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.947.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.55", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1276.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.168", }, { model: "siem enterprise security manager", scope: "eq", trust: 0.3, vendor: "mcafee", version: "9.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.878.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.42", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.542.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1663.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.48", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.9.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.29", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.24", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.62", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.837.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1014", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.43", }, { model: "aura application server sip core pb3", scope: "eq", trust: 0.3, vendor: "avaya", version: "53003.0", }, { model: "high-density server xh621 v100r001c00", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.529.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.70", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.93", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.929.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.324", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.510.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.81", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "0.3.1549", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.410.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.79", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.27", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.48", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.45", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.787.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.323", }, { model: "oceanstor 9000e v100r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "virtualization performance viewer", scope: "eq", trust: 0.3, vendor: "hp", version: "2.01", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.82", }, { model: "linux lts i386", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "12.04", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.292.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.405.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.212.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.684.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.796.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.55", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "0.2.153.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.22", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.223.4", }, { model: "enterprise linux long life server", scope: "eq", trust: 0.3, vendor: "redhat", version: "5.6", }, { model: "ios-xe for catalyst 3k", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.47", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.121", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.38", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1076.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.123", }, { model: "gaia embedded r71.50", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "7830", }, { model: "system networking san96b-5 2498-f96", scope: null, trust: 0.3, vendor: "ibm", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.62", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.103", }, { model: "vcenter server appliance update", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.02", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1307.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.120", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.928.1", }, { model: "smart analytics system", scope: "eq", trust: 0.3, vendor: "ibm", version: "57100", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.757.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.360.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.55", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.249.78", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.45", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.118", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.97", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.54", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.30", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.42", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.120", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.62", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.40", }, { model: "big-ip edge gateway", scope: "eq", trust: 0.3, vendor: "f5", version: "11.3", }, { model: "colorqube", scope: "eq", trust: 0.3, vendor: "xerox", version: "8900", }, { model: "smartcloud entry", scope: "eq", trust: 0.3, vendor: "ibm", version: "3.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.70", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.832.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.63", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1066.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.50", }, { model: "aura system manager sp1", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.55", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.48", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.702.1", }, { model: "aura communication manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "4.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.316", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.49", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.514.1", }, { model: "rack server rh5885h v100r003c", scope: "eq", trust: 0.3, vendor: "huawei", version: "v3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1284.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.221.8", }, { model: "ipso r75.40", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.403.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.45", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.307.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.0", }, { model: "powervu d9190 conditional access manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.29", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.72", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.48", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874102", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.304.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1018.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.360.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1278.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.229", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.572.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.51", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.146", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.139", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.22", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.60", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.65", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.76", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1282.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1057.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.88", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.47", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.2", }, { model: "aura session manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.303.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.49", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.80", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.46", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.777.4", }, { model: "big-ip pem", scope: "eq", trust: 0.3, vendor: "f5", version: "11.3", }, { model: "gaia embedded r71.10", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.100", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.777.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "3", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.10.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.26", }, { model: "aura communication manager sp2", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.63", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.51", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v37006.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.21", }, { model: "elog v200r003c10spc202", scope: "ne", trust: 0.3, vendor: "huawei", version: null, }, { model: "e9000 blade server ch121 v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.436.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.21", }, { model: "totalstorage san16b-2 fabric switch 2005-b16", scope: null, trust: 0.3, vendor: "ibm", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.76", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1030.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.44", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.340", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.45", }, { model: "move", scope: "eq", trust: 0.3, vendor: "mcafee", version: "2.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1689.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.889.2", }, { model: "uma v100r001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.85", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.81", }, { model: "aura communication manager ssp2", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.343", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.531.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.89", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.679.0", }, { model: "big-ip wom", scope: "eq", trust: 0.3, vendor: "f5", version: "11.0", }, { model: "network analysis module", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.38", }, { model: "proactive contact", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.103", }, { model: "ip office application server", scope: "eq", trust: 0.3, vendor: "avaya", version: "8.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.57", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.300", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.893.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.56", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.644.0", }, { model: "virtualization performance viewer", scope: "eq", trust: 0.3, vendor: "hp", version: "1.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.70", }, { model: "network configuration and change management", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "associates customer experience manager transaction impact monitor", scope: "eq", trust: 0.3, vendor: "computer", version: "0", }, { model: "ip deskphones", scope: "eq", trust: 0.3, vendor: "avaya", version: "96x16.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.43", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.570.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.17", }, { model: "totalstorage san256b director model m48 2109-m48", scope: null, trust: 0.3, vendor: "ibm", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.536.1", }, { model: "aura system manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.81", }, { model: "real-time compression appliance", scope: "eq", trust: 0.3, vendor: "ibm", version: "3.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.52", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.37", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.313.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.34", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.30", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "2.0.172.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.351.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.933.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.10", }, { model: "gaia os r76.0", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "oceanstor s5800t v100r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "aura session manager sp1", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.2", }, { model: "ipso r75.45", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.887.0", }, { model: "network data loss prevention", scope: "eq", trust: 0.3, vendor: "mcafee", version: "9.3", }, { model: "advanced threat defense", scope: "eq", trust: 0.3, vendor: "mcafee", version: "3.0", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v70007.1", }, { model: "workcentre r14-10 spar", scope: "ne", trust: 0.3, vendor: "xerox", version: "7755061.090.224.30300", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.23", }, { model: "aura communication manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1288.1", }, { model: "exalogic", scope: "eq", trust: 0.3, vendor: "oracle", version: "0", }, { model: "oceanstor uds v100r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.36", }, { model: "aura system platform", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.2.1.0.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1498.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.793.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.1", }, { model: "vcenter site recovery manager", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.151", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1301.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.71", }, { model: "system storage san24b-4 2498-b24", scope: null, trust: 0.3, vendor: "ibm", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.19", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.34", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.205", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.29", }, { model: "aura application server sip core", scope: "eq", trust: 0.3, vendor: "avaya", version: "53003.0", }, { model: "aura application server sip core pb25", scope: "eq", trust: 0.3, vendor: "avaya", version: "53002.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1043.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1000.0", }, { model: "big-ip link controller", scope: "eq", trust: 0.3, vendor: "f5", version: "11.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.19", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.317", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v50006.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.204", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.342.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.909.0", }, { model: "smart analytics system", scope: "eq", trust: 0.3, vendor: "ibm", version: "76000", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.886.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.17", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.17", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.14", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "36550", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.318", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.25", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.96", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.115", }, { model: "security access manager for web", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.0.0.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.27", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.936.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.38", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.488.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.60", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.52", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.526.0", }, { model: "big-ip apm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.19", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.56", }, { model: "aura messaging", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1", }, { model: "nsx for multi-hypervisor", scope: "eq", trust: 0.3, vendor: "vmware", version: "4.0.3", }, { model: "websphere transformation extender", scope: "eq", trust: 0.3, vendor: "ibm", version: "8.4.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.63", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.808.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.287.0", }, { model: "telepresence", scope: "eq", trust: 0.3, vendor: "cisco", version: "13100", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.584.0", }, { model: "aura system platform sp3", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.33", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1042.0", }, { model: "bash rc1", scope: "eq", trust: 0.3, vendor: "gnu", version: "4.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "2.0.172.33", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v35006.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.103", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.302.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.369.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.907.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.120", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "7232", }, { model: "scale out network attached storage", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.4.3.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.29", }, { model: "aura conferencing", scope: "eq", trust: 0.3, vendor: "avaya", version: "7.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.71", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1685.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.108", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.25", }, { model: "aura system manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.52", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.81", }, { model: "aura system platform sp1", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.823.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.791.0", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v50006.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.577.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.8", }, { model: "aura application enablement services", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2.1", }, { model: "oceanstor s5800t v100r005c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1061.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.91", }, { model: "aura communication manager utility services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.1", }, { model: "smart analytics system", scope: "eq", trust: 0.3, vendor: "ibm", version: "10500", }, { model: "workcentre r15-03 spar", scope: "ne", trust: 0.3, vendor: "xerox", version: "7765061.090.225.06200", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.676.0", }, { model: "virtual library system", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.210", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.525.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.49", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.10", }, { model: "operations analytics", scope: "eq", trust: 0.3, vendor: "hp", version: "2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.490.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.90", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.52", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.681.0", }, { model: "linux", scope: null, trust: 0.3, vendor: "gentoo", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.495.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.44", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.500.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.309", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.97", }, { model: "ironport encryption appliance", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.214", }, { model: "big-ip pem", scope: "eq", trust: 0.3, vendor: "f5", version: "11.4.1", }, { model: "big-ip ltm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5", }, { model: "oceanstor s6900 v100r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1050", }, { model: "storeonce gen backup software", scope: "eq", trust: 0.3, vendor: "hp", version: "22.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.135", }, { model: "oceanstor css v100r001c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.11", }, { model: "aix", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.416.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.950.0", }, { model: "prime service catalog virtual appliance", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "big-iq security", scope: "eq", trust: 0.3, vendor: "f5", version: "4.1", }, { model: "aura communication manager utility services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.78", }, { model: "secureplatform r75.40vs", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "oneview", scope: "ne", trust: 0.3, vendor: "hp", version: "1.20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.613.0", }, { model: "espace meeting v100r001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.32", }, { model: "system networking san96b-5 2498-n96", scope: null, trust: 0.3, vendor: "ibm", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "3.0.182.2", }, { model: "ip office application server", scope: "eq", trust: 0.3, vendor: "avaya", version: "9.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1276.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.163", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.16", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.418.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1281.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1049.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.33", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.26", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.304", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.45", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.162", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "77650", }, { model: "vfabric postgres", scope: "eq", trust: 0.3, vendor: "vmware", version: "9.1.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.18", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.305", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.862.0", }, { model: "b189 ip conference phone", scope: "eq", trust: 0.3, vendor: "avaya", version: "1.023", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.464.1", }, { model: "communication server 1000e signaling server", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.70", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.682.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.15", }, { model: "protectier enterprise edition", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "services vm", scope: "eq", trust: 0.3, vendor: "avaya", version: "1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.940.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.5", }, { model: "iq", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.1", }, { model: "oceanstor css v100r001c02", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.22", }, { model: "big-ip ltm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.0", }, { model: "smart care", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1683.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.151", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.48", }, { model: "enterprise linux hpc node", scope: "eq", trust: 0.3, vendor: "redhat", version: "7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.376.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.50", }, { model: "im and presence service", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "vcloud networking and security", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.5.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.88", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1077.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.38", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1025", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.921.3", }, { model: "oceanstor uds v100r002c00lvdf0", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.17", }, { model: "aura application server sip core", scope: "eq", trust: 0.3, vendor: "avaya", version: "53002.1", }, { model: "oceanstor s5600t v100r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.10", }, { model: "security virtual server protection for vmware", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.1.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.54", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.155", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.538.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.519.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1041.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.69", }, { model: "high-density server dh321 v100r002c00", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.40", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.45", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.561.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1306.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1311.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.586.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.928.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.93", }, { model: "aura collaboration environment", scope: "eq", trust: 0.3, vendor: "avaya", version: "3.0", }, { model: "storeever esl g3 tape library", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.766.0", }, { model: "ip deskphone", scope: "eq", trust: 0.3, vendor: "avaya", version: "96x16.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.23", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.28", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.28", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.34", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.43", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.740.0", }, { model: "proactive network operations center", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.125", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.50", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.50", }, { model: "gaia r75.20", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "vfabric application director", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.603.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.45", }, { model: "linux", scope: "eq", trust: 0.3, vendor: "oracle", version: "7", }, { model: "security access manager for web", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.0.0.4", }, { model: "email and web security appliance", scope: "eq", trust: 0.3, vendor: "mcafee", version: "5.6", }, { model: "espace ivs v100r001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.529.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.95", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.66", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.830.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.75", }, { model: "oceanstor s5500t v100r005c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.203", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.399.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.126", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.131", }, { model: "advanced threat defense", scope: "eq", trust: 0.3, vendor: "mcafee", version: "3.2", }, { model: "chrome beta", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.249.78", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.335.2", }, { model: "oceanstor s2600t v100r002c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.84", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.46", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.925.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.64", }, { model: "oceanstor n8300 v100r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.499.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.864.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.44", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.76", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.18", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.40", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.43", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1076.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.447.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.9", }, { model: "traffix sdc", scope: "eq", trust: 0.3, vendor: "f5", version: "3.4.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.117", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.106", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.63", }, { model: "big-ip wom", scope: "eq", trust: 0.3, vendor: "f5", version: "10.0", }, { model: "aura application enablement services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1", }, { model: "workcentre r14-10 spar", scope: "ne", trust: 0.3, vendor: "xerox", version: "7765061.090.224.30300", }, { model: "it business management suite", scope: "eq", trust: 0.3, vendor: "vmware", version: "1.0", }, { model: "oceanstor s5600t v100r003c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "t620 plus flexible quad core thin client", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.72", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.458.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.40", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.208", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1682.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.959.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.106", }, { model: "oceanstor v100r001c01", scope: "eq", trust: 0.3, vendor: "huawei", version: "9000", }, { model: "virtualization performance viewer", scope: "eq", trust: 0.3, vendor: "hp", version: "1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "0.2.149.27", }, { model: "enterprise linux workstation", scope: "eq", trust: 0.3, vendor: "redhat", version: "7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.624.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.40", }, { model: "linux amd64", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "10.04", }, { model: "security access manager for mobile", scope: "eq", trust: 0.3, vendor: "ibm", version: "8.0.0.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.156", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.612.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.26", }, { model: "b189 ip conference phone", scope: "eq", trust: 0.3, vendor: "avaya", version: "1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.18", }, { model: "propel", scope: "eq", trust: 0.3, vendor: "hp", version: "1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1293.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.38", }, { model: "oceanstor s5500 v100r001c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1668.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1654.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.58", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.73", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.25", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.28", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.698.0", }, { model: "secureplatform r75.46", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.13", }, { model: "ipso r71.10", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1079.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.74", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.29", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.338", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.71", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.51", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.598.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.89", }, { model: "high-density server xh321 v100r002c00", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.25", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1287.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.30", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.65", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.894.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.30", }, { model: "aura system manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1.3", }, { model: "data recovery", scope: "eq", trust: 0.3, vendor: "vmware", version: "2.0.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.87", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1061", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.906.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.777.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.58", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.954.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.408.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.737.0", }, { model: "oceanstor s5800t v100r005c02", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1284.1", }, { model: "ip deskphone", scope: "eq", trust: 0.3, vendor: "avaya", version: "96x16.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.237", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.445.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.214", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.21", }, { model: "storeonce backup", scope: "eq", trust: 0.3, vendor: "hp", version: "3.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.514.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.23", }, { model: "prime collaboration assurance", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1444.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1672.2", }, { model: "operation agent virtual appliance", scope: "eq", trust: 0.3, vendor: "hp", version: "11.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.53", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.41", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.275.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.52", }, { model: "aura system platform sp2", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "websphere process server hypervisor edition", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.0", }, { model: "web gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.3.2.9.", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.27", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.54", }, { model: "oceanstor v100r001c02", scope: "eq", trust: 0.3, vendor: "huawei", version: "v1500", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.827.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.7", }, { model: "ucs central", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.320", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.124", }, { model: "nsx for vsphere", scope: "eq", trust: 0.3, vendor: "vmware", version: "6.0.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.43", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.81", }, { model: "vpn gateway", scope: "eq", trust: 0.3, vendor: "avaya", version: "3090", }, { model: "services vm", scope: "eq", trust: 0.3, vendor: "avaya", version: "2.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.28", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.311", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.693.0", }, { model: "oceanstor vtl6900 v100r005c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.736.0", }, { model: "email gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.0.4", }, { model: "colorqube", scope: "eq", trust: 0.3, vendor: "xerox", version: "9303", }, { model: "network security manager", scope: "eq", trust: 0.3, vendor: "mcafee", version: "6.1.1538", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1069.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1668.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.98", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1019.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.606.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.16", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.438.0", }, { model: "encryption switch 2498-e32", scope: null, trust: 0.3, vendor: "ibm", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.775.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.3", }, { model: "oceanstor css v100r001c05", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.62", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.120", }, { model: "horizon workspace", scope: "eq", trust: 0.3, vendor: "vmware", version: "1.5", }, { model: "thinpro", scope: "eq", trust: 0.3, vendor: "hp", version: "4.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.11", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "7235", }, { model: "server automation", scope: "eq", trust: 0.3, vendor: "hp", version: "9.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.43", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.209", }, { model: "idp series", scope: "eq", trust: 0.3, vendor: "juniper", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.113", }, { model: "phaser r14-12 spar", scope: "ne", trust: 0.3, vendor: "xerox", version: "7800081.150.104.35600", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.77", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.60", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.22", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1299.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.226", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.869.0", }, { model: "dc v100r002", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.64", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.56", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.738.0", }, { model: "big-ip analytics", scope: "eq", trust: 0.3, vendor: "f5", version: "11.1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.102", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.231", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.32", }, { model: "arx", scope: "eq", trust: 0.3, vendor: "f5", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19", }, { model: "edge digital media player", scope: "eq", trust: 0.3, vendor: "cisco", version: "3000", }, { model: "gaia r70", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.2", }, { model: "secureplatform r71.20", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "oceanstor s5800t v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.29", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.18", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.116", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.54", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.13", }, { model: "secureplatform ngx r65", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.98", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.578.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.418.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.79", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.121", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.54", }, { model: "big-ip gtm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.63", }, { model: "aura session manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.29", }, { model: "smart zero core", scope: "eq", trust: 0.3, vendor: "hp", version: "4.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.18", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.958.0", }, { model: "agile controller v100r001c00spc205", scope: "ne", trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.380.0", }, { model: "cloud single sign on", scope: "eq", trust: 0.3, vendor: "mcafee", version: "4.0.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.25", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.17", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.28", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.809.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.2", }, { model: "show and share", scope: "eq", trust: 0.3, vendor: "cisco", version: "5(2)", }, { model: "mds", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.105", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.50", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1681.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15", }, { model: "arx", scope: "eq", trust: 0.3, vendor: "f5", version: "6.3", }, { model: "gaia embedded r75.10", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.76", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.361.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1036.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1018", }, { model: "flex system manager", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.3.1", }, { model: "hyperdp oceanstor n8500 v200r001c91", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.701.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.54", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "0.4.154.22", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.780.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.116", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v70006.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.605.0", }, { model: "t620 plus flexible dual core thin client", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1051.0", }, { model: "physical access gateway", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.51", }, { model: "ipso r71.45", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "secure access link policy server", scope: "eq", trust: 0.3, vendor: "avaya", version: "1.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.58", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.49", }, { model: "enterprise linux desktop", scope: "eq", trust: 0.3, vendor: "redhat", version: "6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.32", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.55", }, { model: "flex system manager", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.3.0.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.663.0", }, { model: "big-ip ltm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.4.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.537.0", }, { model: "aura session manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.3", }, { model: "phaser r14-12 spar", scope: "ne", trust: 0.3, vendor: "xerox", version: "6700081.140.105.00700", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1275.0", }, { model: "oic v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.133", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.96", }, { model: "big-ip ltm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.0", }, { model: "web gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.3.2.9", }, { model: "network data loss prevention", scope: "eq", trust: 0.3, vendor: "mcafee", version: "9.2.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.79", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1046.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.122", }, { model: "ucs director", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "t610 flexible thin client", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1062", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.934.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.27", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.11", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.928.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.490.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1020", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.469.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.9", }, { model: "smartcloud provisioning fixpack for sv", scope: "eq", trust: 0.3, vendor: "ibm", version: "2.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1080.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.67", }, { model: "enterprise manager", scope: "eq", trust: 0.3, vendor: "f5", version: "3.0", }, { model: "telepresence isdn link", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "espace uc v200r001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "physical access manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "2054-e11", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.307.4", }, { model: "big-ip aam", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5.1", }, { model: "secureplatform r70.50", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.951.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.22", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "1.0.154.55", }, { model: "gaia r71", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.9.4", }, { model: "workcentre r15-03 spar", scope: "ne", trust: 0.3, vendor: "xerox", version: "7775061.090.225.06200", }, { model: "oceanstor s2200t v100r005c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.0", }, { model: "netflow collection agent", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.130", }, { model: "infosphere balanced warehouse c4000", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.414.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.26", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.52", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.55", }, { model: "big-ip apm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.6.0", }, { model: "big-ip wom", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.332", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.85", }, { model: "unified communications domain manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.81", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.342.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.108", }, { model: "secure access control server", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.18", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.688.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1050.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.479.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.19", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.11", }, { model: "oceanstor s5600 v100r001c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.15", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.960.0", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.9.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.838.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.27", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.394.0", }, { model: "network security sensor appliance", scope: "eq", trust: 0.3, vendor: "mcafee", version: "8.1", }, { model: "oceanstor s2600 v100r001c02", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.18", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.43", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.41", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.718.0", }, { model: "secureplatform r75.46", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.503.1", }, { model: "systems insight manager", scope: "eq", trust: 0.3, vendor: "hp", version: "7.2.2", }, { model: "uma-db v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.890.1", }, { model: "oceanstor s2200t v100r005c02", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "service control engine", scope: "eq", trust: 0.3, vendor: "cisco", version: "10100", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.21", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1057.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.19", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.20", }, { model: "aura messaging", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.0.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.528.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.408.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.30", }, { model: "rack server rh2288e v100r002c", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.25", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.61", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1676.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.100", }, { model: "big-ip apm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.4.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.62", }, { model: "cloud identity manager", scope: "eq", trust: 0.3, vendor: "mcafee", version: "3.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.41", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.2491064", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.84", }, { model: "sal gw virtual app", scope: "eq", trust: 0.3, vendor: "avaya", version: "1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.25", }, { model: "security access manager for web", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.0.0.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.105", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1023.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.325.0", }, { model: "high-density server xh320 v100r001c00", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.33", }, { model: "big-ip apm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.57", }, { model: "secure access core concentrator", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.0", }, { model: "nexus", scope: "eq", trust: 0.3, vendor: "cisco", version: "90000", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.46", }, { model: "espace vtm v100r001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1010.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.724.0", }, { model: "oceanstor hdp3500e v100r003c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.335.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.431.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.65", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.10", }, { model: "configuration and orchestration manager com", scope: "eq", trust: 0.3, vendor: "avaya", version: "3.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.47", }, { model: "cloud identity manager", scope: "eq", trust: 0.3, vendor: "mcafee", version: "3.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "3.0.195.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.64", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.498.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.51", }, { model: "big-ip webaccelerator", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2.00", }, { model: "infosphere guardium", scope: "eq", trust: 0.3, vendor: "ibm", version: "9.1", }, { model: "big-ip gtm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.612.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.406.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.938.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.515.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1294.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.36", }, { model: "prime infrastructure", scope: "eq", trust: 0.3, vendor: "cisco", version: "1.2.1", }, { model: "fusionaccess v100r005c10", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.91275", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.55", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.445.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.409.0", }, { model: "aura communication manager utility services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.2.4.0.15", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.68", }, { model: "security access manager for mobile", scope: "eq", trust: 0.3, vendor: "ibm", version: "8.0.0.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.16", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.775.4", }, { model: "web gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.4.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.315.0", }, { model: "network convergence system", scope: "eq", trust: 0.3, vendor: "cisco", version: "60000", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.21", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.741.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.27", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.101", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "2.0.170.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.588.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.29", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.59", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.75", }, { model: "galax8800 v100r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.26", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1045.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.799.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.511.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.104", }, { model: "secureplatform r77.20", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.16", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1073.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.152", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.792.0", }, { model: "secureplatform r77.10", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "ipso r71.20", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "storefabric c-series mds switches", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "gaia embedded r75.20", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.9", }, { model: "uma v200r001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1667.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.21", }, { model: "scale out network attached storage", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.4.3.1", }, { model: "omm solution v100r001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.322", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.33", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1279.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.87", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "2.0.169.1", }, { model: "big-ip link controller", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.272.0", }, { model: "secureplatform r75.10", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.97", }, { model: "gaia embedded ngx r65", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "associates application performance management", scope: "eq", trust: 0.3, vendor: "computer", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.411.0", }, { model: "oceanstor vtl6000 v100r003c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.36", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.52", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.44", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.103", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.47", }, { model: "elog v100r003", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "secureplatform r70", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "linux lts amd64", scope: "eq", trust: 0.3, vendor: "ubuntu", version: "12.04", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.223.5", }, { model: "thinpro", scope: "eq", trust: 0.3, vendor: "hp", version: "5.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.367.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1045", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1016", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.112", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.106", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.454.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.634.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.79", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "1.0.154.43", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.53", }, { model: "nexus series switches", scope: "eq", trust: 0.3, vendor: "cisco", version: "70000", }, { model: "oceanstor s5800t v100r003c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1029.0", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v70007.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.466.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.2", }, { model: "fusionstorage dsware v100r003c02spc100", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.337.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.507.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.54", }, { model: "message networking sp4", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.43", }, { model: "e9000 blade server ch222 v100r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1032", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1302.0", }, { model: "nexus switch for nexus series", scope: "eq", trust: 0.3, vendor: "cisco", version: "1000v70004.1.(2)", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.33", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.118", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.51", }, { model: "server automation", scope: "eq", trust: 0.3, vendor: "hp", version: "10.01", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.827.0", }, { model: "big-iq security", scope: "eq", trust: 0.3, vendor: "f5", version: "4.3", }, { model: "aura communication manager utility services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.2.5.0.15", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.642.2", }, { model: "web gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.3.2.10", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v70006.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.945.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.1", }, { model: "network performance analytics", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "system storage storwize unified", scope: "eq", trust: 0.3, vendor: "ibm", version: "v70001.4", }, { model: "vcenter server appliance", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.151", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.342.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.46", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.16", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.76", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.30", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.107", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.94", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1666.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.41", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.895.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.355.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.6", }, { model: "aura system manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1", }, { model: "smart zero core", scope: "eq", trust: 0.3, vendor: "hp", version: "5.0", }, { model: "supercluster", scope: "eq", trust: 0.3, vendor: "oracle", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.21", }, { model: "e9000 blade server ch221 v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "big-ip ltm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2.1", }, { model: "flex system manager", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.3.20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.49", }, { model: "gaia r75", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "traffix sdc", scope: "eq", trust: 0.3, vendor: "f5", version: "3.3.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.308.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.29", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "2.0.172", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.44", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.40", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1272.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.234", }, { model: "galax8800 v100r002c85", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.33", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.21", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "7220", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.104", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.103", }, { model: "move antivirus agentless", scope: "eq", trust: 0.3, vendor: "mcafee", version: "3.0", }, { model: "sdn for virtual environments", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.1", }, { model: "big data appliance", scope: "eq", trust: 0.3, vendor: "oracle", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.650.0", }, { model: "gaia embedded r77", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.19", }, { model: "vcenter support assistant", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.8", }, { model: "oceanstor s6800t v100r003c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.338.0", }, { model: "vcenter server appliance update", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.01", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.47", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.451.0", }, { model: "vsphere app ha", scope: "eq", trust: 0.3, vendor: "vmware", version: "1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.135", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.38", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.61", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "1.0.154.59", }, { model: "tssc", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.3", }, { model: "smartcloud entry", scope: "eq", trust: 0.3, vendor: "ibm", version: "2.3.0", }, { model: "email gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.418.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1301.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.222.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.29", }, { model: "saas web protection", scope: "eq", trust: 0.3, vendor: "mcafee", version: "1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.75", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.868.0", }, { model: "agile controller v100r001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.536.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1304.1", }, { model: "webex pcnow", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.19", }, { model: "aura application enablement services", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.4", }, { model: "oceanstor s6800t v100r005c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "qlogic 20-port 8gb san switch module for ibm bladecenter", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.10.1.29", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.45", }, { model: "security virtual server protection for vmware", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.1", }, { model: "oceanstor cse v100r001c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1671.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.82", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.98", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.15", }, { model: "power hmc r8.1.0", scope: "eq", trust: 0.3, vendor: "ibm", version: "8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1017.0", }, { model: "web element manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "prime network services controller", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "mac os", scope: "ne", trust: 0.3, vendor: "apple", version: "x10.10.2", }, { model: "iq", scope: "eq", trust: 0.3, vendor: "avaya", version: "4.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.40", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.92", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.427.0", }, { model: "e9000 blade server ch242 v100r001c00", scope: "eq", trust: 0.3, vendor: "huawei", version: "v3", }, { model: "ipso r70.1", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.5", }, { model: "big-ip analytics", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1024", }, { model: "tssc", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.3.16", }, { model: "traffix sdc", scope: "eq", trust: 0.3, vendor: "f5", version: "3.5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.53", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "2.0.172.43", }, { model: "oceanstor s5500t v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.276.0", }, { model: "big-ip link controller", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5", }, { model: "aura collaboration environment", scope: "eq", trust: 0.3, vendor: "avaya", version: "2.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.60", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.117", }, { model: "big-ip apm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2.1", }, { model: "espace u2980 v100r001c10spc102", scope: "ne", trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.57", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.307.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.87", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.112", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.32", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.46", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.933.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.121", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.642.0", }, { model: "netauthenticate", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.61", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.574.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.936.1", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.37", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.43", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "2.0.172.38", }, { model: "webex meetings server", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.27", }, { model: "3722-s51", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "workcentre r14-10 spar", scope: "ne", trust: 0.3, vendor: "xerox", version: "7775061.090.224.30300", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "26.0.1410.64", }, { model: "aura conferencing", scope: "eq", trust: 0.3, vendor: "avaya", version: "7.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.317.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.320.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.42", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.72", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.24", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.946.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "1.0.154.65", }, { model: "ads virtual app", scope: "eq", trust: 0.3, vendor: "avaya", version: "2.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.48", }, { model: "arx", scope: "eq", trust: 0.3, vendor: "f5", version: "6.1.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.888.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.37", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.18", }, { model: "access registrar appliance cisco prime access registrar applianc", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.29", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.17", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1307.0", }, { model: "big-iq cloud", scope: "eq", trust: 0.3, vendor: "f5", version: "4.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.224.0", }, { model: "rack server rh5885 v100r001c0", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.33", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1678.1", }, { model: "big-ip asm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.97", }, { model: "socialminer", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.26", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.704.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.149", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.60", }, { model: "message networking", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.24", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1035", }, { model: "policy assessment and compliance", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.67", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.288.1", }, { model: "aura session manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1.1", }, { model: "ipso r76", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1291.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.68", }, { model: "scale out network attached storage", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.4.3.2", }, { model: "smart analytics system", scope: "eq", trust: 0.3, vendor: "ibm", version: "20500", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.43", }, { model: "san volume controller", scope: "eq", trust: 0.3, vendor: "ibm", version: "0", }, { model: "oceanstor 18800f v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.15", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.59", }, { model: "web gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.4.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v50007.3", }, { model: "espace uc v100r002", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.60", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "29.0.1547.57", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.59", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.41", }, { model: "espace uc v200r002", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.223.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.632.0", }, { model: "big-ip gtm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.6.0", }, { model: "big-ip analytics", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.158", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.154", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.328", }, { model: "operation agent virtual appliance", scope: "eq", trust: 0.3, vendor: "hp", version: "11.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.9", }, { model: "flex system manager", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.889.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.61", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.777.2", }, { model: "aura application server sip core pb26", scope: "eq", trust: 0.3, vendor: "avaya", version: "53002.0", }, { model: "vae v100r001c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.34", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.899.0", }, { model: "websphere message broker", scope: "eq", trust: 0.3, vendor: "ibm", version: "8.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.28", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.418.2", }, { model: "websphere process server hypervisor edition for novell suse", scope: "eq", trust: 0.3, vendor: "ibm", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.39", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1029", }, { model: "gaia r71.40", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.571.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.23", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.57", }, { model: "messaging application server", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.50", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.79", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.101", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1677.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.19", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.911.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.82", }, { model: "esight network v200r003c10spc206", scope: "ne", trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.734.0", }, { model: "big-ip gtm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.4.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.15", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.55", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.954.1", }, { model: "cloudsystem enterprise software", scope: "eq", trust: 0.3, vendor: "hp", version: "8.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.4", }, { model: "gaia embedded r75.46", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "gaia r70.50", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "aura communication manager sp4", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2.1", }, { model: "big-ip gtm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.418.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.25", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.667.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.38", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1310.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.34", }, { model: "t505 flexible thin client", scope: "eq", trust: 0.3, vendor: "hp", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.342", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.93", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.7.3", }, { model: "aura presence services sp1", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.53", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.16", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.485.0", }, { model: "big-ip wom", scope: "eq", trust: 0.3, vendor: "f5", version: "11.3.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.48", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.678.0", }, { model: "server automation", scope: "eq", trust: 0.3, vendor: "hp", version: "10.00", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.18", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.16", }, { model: "big-ip psm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5", }, { model: "virtual compute appliance software", scope: "eq", trust: 0.3, vendor: "oracle", version: "0", }, { model: "puredata system for analytics", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.372.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.91", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.77", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.949.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.638.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.450.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.392.0", }, { model: "communication server 1000m signaling server", scope: "eq", trust: 0.3, vendor: "avaya", version: "7.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.44", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.212", }, { model: null, scope: "eq", trust: 0.3, vendor: "ibm", version: "2053-4340", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.302.1", }, { model: "websphere transformation extender", scope: "eq", trust: 0.3, vendor: "ibm", version: "8.40", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1063", }, { model: "gaia embedded r75.30", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.710.0", }, { model: "sig9800 sig9800-x16 v300r002", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "communication server 1000e", scope: "eq", trust: 0.3, vendor: "avaya", version: "7.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.206", }, { model: "fusioncompute v100r003c10cp6001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.289.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.56", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.49", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.11", }, { model: "vcloud networking and security", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.1.4.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.96", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1685.0", }, { model: "vpn gateway", scope: "eq", trust: 0.3, vendor: "avaya", version: "3070", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.735.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.568.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.487.0", }, { model: "ipso r70.50", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.302.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.129", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.124", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.9", }, { model: "big-ip wom", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.590.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.113", }, { model: "web gateway", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.4.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.17", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.827.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.23", }, { model: "rack server rh5885 v100r003c0", scope: "eq", trust: 0.3, vendor: "huawei", version: "v3", }, { model: "gaia r71.10", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "system storage san04b-r 2005-r04", scope: null, trust: 0.3, vendor: "ibm", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.89", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.332.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.49", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.107", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.953.0", }, { model: "oceanstor s2600t v100r005c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.666.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1071.0", }, { model: "big-ip edge gateway", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1013.0", }, { model: "big-ip webaccelerator", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5.1", }, { model: "collaboration pod on vmware vcenter server appliance", scope: "eq", trust: 0.3, vendor: "avaya", version: "2.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.41", }, { model: "next generation firewall", scope: "eq", trust: 0.3, vendor: "hp", version: "1.0.23988", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.44", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.73", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.83", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.0.275.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.340.0", }, { model: "big-ip asm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.5", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "57450", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.373.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.46", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.87", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.32", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.2", }, { model: "thinpro", scope: "eq", trust: 0.3, vendor: "hp", version: "1.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1036.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.50", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v50006.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.353.0", }, { model: "aura presence services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.1.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.408.2", }, { model: "gaia r75.30", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "7228", }, { model: "oceanstor s6900 v100r001c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.43", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.26", }, { model: "policy assessment and compliance", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.47", }, { model: "secureplatform r75.30", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.51", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.470.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.461.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1285.1", }, { model: "prime infrastructure", scope: "eq", trust: 0.3, vendor: "cisco", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.446.0", }, { model: "secureplatform r75.47", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "move firewall", scope: "eq", trust: 0.3, vendor: "mcafee", version: "3.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.88", }, { model: "big-ip analytics", scope: "eq", trust: 0.3, vendor: "f5", version: "11.3", }, { model: "mac os", scope: "eq", trust: 0.3, vendor: "apple", version: "x10.10", }, { model: "systems insight manager", scope: "eq", trust: 0.3, vendor: "hp", version: "7.3.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.5", }, { model: "nsmxpress appliances", scope: "eq", trust: 0.3, vendor: "juniper", version: "2012.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.357.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.42", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.459.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.541.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.221", }, { model: "espace u2980 v100r001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.65", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.64", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.31", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.18", }, { model: "nexus switch for nexus series 4.1 e1", scope: "eq", trust: 0.3, vendor: "cisco", version: "1000v4000", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.333.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.779.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.90", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.57", }, { model: "aura application enablement services", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "1.0.154.42", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "6655", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.17", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.9", }, { model: "bsc6000 v900r008c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.307", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.121", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.127", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.20", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1027", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.396.0", }, { model: "network security manager", scope: "eq", trust: 0.3, vendor: "mcafee", version: "7.1.157", }, { model: "bsc6000 v901r013c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.110", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.101", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.428.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.42", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.29", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.612.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.95", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.92", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1035.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.767.0", }, { model: "colorqube", scope: "eq", trust: 0.3, vendor: "xerox", version: "9301", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.891.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.460.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.14", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1001.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.87", }, { model: "siem enterprise security manager", scope: "eq", trust: 0.3, vendor: "mcafee", version: "9.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.2", }, { model: "vcloud networking and security", scope: "eq", trust: 0.3, vendor: "vmware", version: "5.5", }, { model: "galax8800 v100r002c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "secureplatform r71.50", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.466.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1053", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.74", }, { model: "viewplanner", scope: "eq", trust: 0.3, vendor: "vmware", version: "3.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.8", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "5945", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.455.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.45", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.25", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1014.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.220", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.210", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.21", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.449.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.142", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.26", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.9", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.911.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.66", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.4", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.72", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.620.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.10", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.497.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "33.0.1750.82", }, { model: "oceanstor s5900 v100r002c00", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.576.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "28.0.1500.61", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1015.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.33", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.795.0", }, { model: "big-ip apm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.1.0", }, { model: "secureplatform r76", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "2.6", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.213", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1010.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.13", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "16.0.912.12", }, { model: "gaia embedded r70.40", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "big-ip wom", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.148", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.99", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1682.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.437.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.751.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.636.0", }, { model: "secure access link gas", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.0", }, { model: "oceanstor s5300 v100r005c02", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.91", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.313", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.360.5", }, { model: "ip office server edition", scope: "eq", trust: 0.3, vendor: "avaya", version: "8.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "65.72", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.12", }, { model: "workcentre", scope: "eq", trust: 0.3, vendor: "xerox", version: "57400", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.64", }, { model: "big-iq cloud", scope: "eq", trust: 0.3, vendor: "f5", version: "4.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1670.5", }, { model: "big-ip webaccelerator", scope: "eq", trust: 0.3, vendor: "f5", version: "11.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.456.0", }, { model: "big-ip link controller", scope: "eq", trust: 0.3, vendor: "f5", version: "11.4.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.874.12", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.831.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "37.0.2062.65", }, { model: "saas email protection", scope: "eq", trust: 0.3, vendor: "mcafee", version: "1.0", }, { model: "oceanstor s6800t v100r001c01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "high-density server dh621 v100r001c00", scope: "eq", trust: 0.3, vendor: "huawei", version: "v2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.47", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.18", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.38", }, { model: "big-iq security", scope: "eq", trust: 0.3, vendor: "f5", version: "4.2", }, { model: "secureplatform r76", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "proactive contact", scope: "eq", trust: 0.3, vendor: "avaya", version: "5.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.111", }, { model: "big-ip ltm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.3.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.67", }, { model: "big-ip link controller", scope: "eq", trust: 0.3, vendor: "f5", version: "10.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.375.53", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.550.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1305.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.583.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.317.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.595.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1009", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "34.0.1847.131", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.108", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "0.3.154.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "23.0.1271.17", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.94", }, { model: "virtual security gateway for microsoft hyper-v", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "15.0.866.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.34", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.48", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.35", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1673.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "25.0.1364.72", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.22", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "30.0.1599.101", }, { model: "big-ip gtm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.2.1", }, { model: "workcentre spar", scope: "ne", trust: 0.3, vendor: "xerox", version: "7545061.121.225.06100", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.85", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.47", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.131", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.15", }, { model: "secureplatform r71.10", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.128", }, { model: "configuration and orchestration manager vps", scope: "eq", trust: 0.3, vendor: "avaya", version: "1.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.342.8", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.62", }, { model: "telepresence system", scope: "eq", trust: 0.3, vendor: "cisco", version: "500-320", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1700.63", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.653.0", }, { model: "aura application server sip core pb16", scope: "eq", trust: 0.3, vendor: "avaya", version: "53002.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.63", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "32.0.1656.1", }, { model: "associates layer api management portal", scope: "eq", trust: 0.3, vendor: "computer", version: "70", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "22.0.1229.92", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "17.0.963.35", }, { model: "big-ip ltm", scope: "eq", trust: 0.3, vendor: "f5", version: "10.2.4", }, { model: "big-ip asm", scope: "eq", trust: 0.3, vendor: "f5", version: "11.0.00", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.713.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.643.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.62", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.22", }, { model: "fusioncompute v100r003c10", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1057.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.7", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "8.0.552.228", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.2", }, { model: "flex system manager", scope: "eq", trust: 0.3, vendor: "ibm", version: "1.2.1", }, { model: "unified communications manager", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.28", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.504.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.517.44", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1312.12", }, { model: "ipso r71.40", scope: "eq", trust: 0.3, vendor: "checkpoint", version: "6.2", }, { model: "unstructured data identification and mgmt", scope: "eq", trust: 0.3, vendor: "ibm", version: "7.5.1", }, { model: "communication server 1000m", scope: "eq", trust: 0.3, vendor: "avaya", version: "7.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.767.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "24.0.1292.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1058.0", }, { model: "big-ip analytics", scope: "eq", trust: 0.3, vendor: "f5", version: "11.4.1", }, { model: "telepresence system", scope: "eq", trust: 0.3, vendor: "cisco", version: "500-370", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "18.0.1025.129", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "12.0.742.21", }, { model: "aura communication manager utility services", scope: "eq", trust: 0.3, vendor: "avaya", version: "6.2", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "31.0.1650.52", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "20.0.1132.54", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.41", }, { model: "next generation firewall", scope: "eq", trust: 0.3, vendor: "hp", version: "1.14150", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.218", }, { model: "oneview", scope: "eq", trust: 0.3, vendor: "hp", version: "1.05", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.418.4", }, { model: "gaia r71.50", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "visual quality experience tools server", scope: "eq", trust: 0.3, vendor: "cisco", version: "0", }, { model: "storwize", scope: "eq", trust: 0.3, vendor: "ibm", version: "v37007.1", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.68", }, { model: "espace dcm v100r001", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.359.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1084.26", }, { model: "communication server 1000m signaling server", scope: "eq", trust: 0.3, vendor: "avaya", version: "7.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.205", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.597.83", }, { model: "big-ip webaccelerator", scope: "eq", trust: 0.3, vendor: "f5", version: "11.3", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.78", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.565.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "7.0.536.3", }, { model: "communication server 1000e", scope: "eq", trust: 0.3, vendor: "avaya", version: "7.5", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "9.0.567.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "5.0.37586", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.835.33", }, { model: "oceanstor cse v100r002c00lsfm01", scope: null, trust: 0.3, vendor: "huawei", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "6.0.472.56", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "27.0.1453.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "13.0.782.238", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.656.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.696.55", }, { model: "ip flow manager", scope: "eq", trust: 0.3, vendor: "avaya", version: "0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "21.0.1180.53", }, { model: "b189 ip conference phone", scope: "eq", trust: 0.3, vendor: "avaya", version: "1.022", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "4.1.249.1011", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "10.0.648.66", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "19.0.1033.0", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "35.0.1916.38", }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "14.0.788.0", }, { model: "gaia embedded r70.30", scope: null, trust: 0.3, vendor: "checkpoint", version: null, }, { model: "chrome", scope: "eq", trust: 0.3, vendor: "google", version: "11.0.691.0", }, ], sources: [ { db: "CERT/CC", id: "VU#252743", }, { db: "BID", id: "70154", }, { db: "JVNDB", id: "JVNDB-2014-004433", }, { db: "JVNDB", id: "JVNDB-2014-000126", }, { db: "CNNVD", id: "CNNVD-201409-1073", }, { db: "NVD", id: "CVE-2014-7187", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2014-7187", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "HP", sources: [ { db: "PACKETSTORM", id: "130988", }, { db: "PACKETSTORM", id: "128864", }, { db: "PACKETSTORM", id: "128752", }, { db: "PACKETSTORM", id: "128666", }, { db: "PACKETSTORM", id: "129264", }, { db: "PACKETSTORM", id: "128763", }, { db: "PACKETSTORM", id: "129095", }, { db: "PACKETSTORM", id: "130335", }, { db: "PACKETSTORM", id: "128755", }, ], trust: 0.9, }, cve: "CVE-2014-7187", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", exploitabilityScore: 10, impactScore: 10, integrityImpact: "COMPLETE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Complete", baseScore: 10, confidentialityImpact: "Complete", exploitabilityScore: null, id: "CVE-2014-7187", impactScore: null, integrityImpact: "Complete", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.9, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "IPA", availabilityImpact: "Complete", baseScore: 10, confidentialityImpact: "Complete", exploitabilityScore: null, id: "JVNDB-2014-000126", impactScore: null, integrityImpact: "Complete", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [], severity: [ { author: "NVD", id: "CVE-2014-7187", trust: 1.8, value: "HIGH", }, { author: "IPA", id: "JVNDB-2014-000126", trust: 0.8, value: "High", }, { author: "CNNVD", id: "CNNVD-201409-1073", trust: 0.6, value: "CRITICAL", }, { author: "VULMON", id: "CVE-2014-7187", trust: 0.1, value: "HIGH", }, ], }, ], sources: [ { db: "VULMON", id: "CVE-2014-7187", }, { db: "JVNDB", id: "JVNDB-2014-004433", }, { db: "JVNDB", id: "JVNDB-2014-000126", }, { db: "CNNVD", id: "CNNVD-201409-1073", }, { db: "NVD", id: "CVE-2014-7187", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue. QNAP Systems, Inc. Provided by QTS teeth, Turbo NAS for OS is. QTS for, GNU Bash Vulnerability (JVNVU#97219505) caused by OS Command injection vulnerability (CWE-78) Exists. This vulnerability information is based on the Information Security Early Warning Partnership. IPA Report to JPCERT/CC Coordinated with the developer. Reporter : University of Electro-Communications Wakisaka Yuki MrAny application permission OS The command may be executed. \nAn attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. \nGNU Bash 3.2 and later are vulnerable; prior versions may also be affected. \n\n HP StoreEver ESL E-series Tape Library\n\n - Disable DHCP and only use static IP addressing. \n\n HP Virtual Library System (VLS)\n\n - Disable DHCP and only use static IP addressing. \n\nThis vulnerability allows users that have been granted access to a shell\nscript to escalate privilege and execute unrestricted commands at the same\nsecurity level as the Bash script. \n\nOpen the PXE Configuration Utility on the HP Insight Control server\ndeployment window\nSelect Linux Managed from the Boot Menu options\nClick the Edit button. Clicking the Edit button displays the Edit Shared Menu\nOption window\nUncheck the x86 option in Operating System and Processor Options and click\nOK. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: bash security update\nAdvisory ID: RHSA-2014:1311-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2014-1311.html\nIssue date: 2014-09-26\nCVE Names: CVE-2014-7169 CVE-2014-7186 CVE-2014-7187 \n=====================================================================\n\n1. Summary:\n\nUpdated bash packages that fix one security issue are now available for Red\nHat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise\nLinux 5.6 Long Life, Red Hat Enterprise Linux 5.9 Extended Update Support,\nRed Hat Enterprise Linux 6.2 Advanced Update Support, and Red Hat\nEnterprise Linux 6.4 Extended Update Support. \n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux AS (v. 4 ELS) - i386, ia64, x86_64\nRed Hat Enterprise Linux AUS (v. 6.2 server) - x86_64\nRed Hat Enterprise Linux Compute Node Optional EUS (v. 6.4) - x86_64\nRed Hat Enterprise Linux ES (v. 4 ELS) - i386, x86_64\nRed Hat Enterprise Linux EUS (v. 5.9 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux HPC Node EUS (v. 6.4) - x86_64\nRed Hat Enterprise Linux LL (v. 5.6 server) - i386, ia64, x86_64\nRed Hat Enterprise Linux Server EUS (v. 6.4) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional AUS (v. 6.2) - x86_64\nRed Hat Enterprise Linux Server Optional EUS (v. 6.4) - i386, ppc64, s390x, x86_64\n\n3. Description:\n\nThe GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux. \n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nApplications which directly create Bash functions as environment variables\nneed to be made aware of the changes to the way names are handled by this\nupdate. For more information see the Knowledgebase article at\nhttps://access.redhat.com/articles/1200223\n\nNote: Docker users are advised to use \"yum update\" within their containers,\nand to commit the resulting changes. \n\nFor additional information on CVE-2014-6271 and CVE-2014-7169, refer to the\naforementioned Knowledgebase article. \n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata \nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1146319 - CVE-2014-7169 bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)\n\n6. Package List:\n\nRed Hat Enterprise Linux AS (v. 4 ELS):\n\nSource:\nbash-3.0-27.el4.4.src.rpm\n\ni386:\nbash-3.0-27.el4.4.i386.rpm\nbash-debuginfo-3.0-27.el4.4.i386.rpm\n\nia64:\nbash-3.0-27.el4.4.i386.rpm\nbash-3.0-27.el4.4.ia64.rpm\nbash-debuginfo-3.0-27.el4.4.i386.rpm\nbash-debuginfo-3.0-27.el4.4.ia64.rpm\n\nx86_64:\nbash-3.0-27.el4.4.x86_64.rpm\nbash-debuginfo-3.0-27.el4.4.x86_64.rpm\n\nRed Hat Enterprise Linux ES (v. 4 ELS):\n\nSource:\nbash-3.0-27.el4.4.src.rpm\n\ni386:\nbash-3.0-27.el4.4.i386.rpm\nbash-debuginfo-3.0-27.el4.4.i386.rpm\n\nx86_64:\nbash-3.0-27.el4.4.x86_64.rpm\nbash-debuginfo-3.0-27.el4.4.x86_64.rpm\n\nRed Hat Enterprise Linux LL (v. 5.6 server):\n\nSource:\nbash-3.2-24.el5_6.2.src.rpm\n\ni386:\nbash-3.2-24.el5_6.2.i386.rpm\nbash-debuginfo-3.2-24.el5_6.2.i386.rpm\n\nia64:\nbash-3.2-24.el5_6.2.i386.rpm\nbash-3.2-24.el5_6.2.ia64.rpm\nbash-debuginfo-3.2-24.el5_6.2.i386.rpm\nbash-debuginfo-3.2-24.el5_6.2.ia64.rpm\n\nx86_64:\nbash-3.2-24.el5_6.2.x86_64.rpm\nbash-debuginfo-3.2-24.el5_6.2.x86_64.rpm\n\nRed Hat Enterprise Linux EUS (v. 5.9 server):\n\nSource:\nbash-3.2-32.el5_9.3.src.rpm\n\ni386:\nbash-3.2-32.el5_9.3.i386.rpm\nbash-debuginfo-3.2-32.el5_9.3.i386.rpm\n\nia64:\nbash-3.2-32.el5_9.3.i386.rpm\nbash-3.2-32.el5_9.3.ia64.rpm\nbash-debuginfo-3.2-32.el5_9.3.i386.rpm\nbash-debuginfo-3.2-32.el5_9.3.ia64.rpm\n\nppc:\nbash-3.2-32.el5_9.3.ppc.rpm\nbash-debuginfo-3.2-32.el5_9.3.ppc.rpm\n\ns390x:\nbash-3.2-32.el5_9.3.s390x.rpm\nbash-debuginfo-3.2-32.el5_9.3.s390x.rpm\n\nx86_64:\nbash-3.2-32.el5_9.3.x86_64.rpm\nbash-debuginfo-3.2-32.el5_9.3.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node EUS (v. 6.4):\n\nSource:\nbash-4.1.2-15.el6_4.2.src.rpm\n\nx86_64:\nbash-4.1.2-15.el6_4.2.x86_64.rpm\nbash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Compute Node Optional EUS (v. 6.4):\n\nSource:\nbash-4.1.2-15.el6_4.2.src.rpm\n\nx86_64:\nbash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm\nbash-doc-4.1.2-15.el6_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux AUS (v. 6.2 server):\n\nSource:\nbash-4.1.2-9.el6_2.2.src.rpm\n\nx86_64:\nbash-4.1.2-9.el6_2.2.x86_64.rpm\nbash-debuginfo-4.1.2-9.el6_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server EUS (v. 6.4):\n\nSource:\nbash-4.1.2-15.el6_4.2.src.rpm\n\ni386:\nbash-4.1.2-15.el6_4.2.i686.rpm\nbash-debuginfo-4.1.2-15.el6_4.2.i686.rpm\n\nppc64:\nbash-4.1.2-15.el6_4.2.ppc64.rpm\nbash-debuginfo-4.1.2-15.el6_4.2.ppc64.rpm\n\ns390x:\nbash-4.1.2-15.el6_4.2.s390x.rpm\nbash-debuginfo-4.1.2-15.el6_4.2.s390x.rpm\n\nx86_64:\nbash-4.1.2-15.el6_4.2.x86_64.rpm\nbash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional AUS (v. 6.2):\n\nSource:\nbash-4.1.2-9.el6_2.2.src.rpm\n\nx86_64:\nbash-debuginfo-4.1.2-9.el6_2.2.x86_64.rpm\nbash-doc-4.1.2-9.el6_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional EUS (v. 6.4):\n\nSource:\nbash-4.1.2-15.el6_4.2.src.rpm\n\ni386:\nbash-debuginfo-4.1.2-15.el6_4.2.i686.rpm\nbash-doc-4.1.2-15.el6_4.2.i686.rpm\n\nppc64:\nbash-debuginfo-4.1.2-15.el6_4.2.ppc64.rpm\nbash-doc-4.1.2-15.el6_4.2.ppc64.rpm\n\ns390x:\nbash-debuginfo-4.1.2-15.el6_4.2.s390x.rpm\nbash-doc-4.1.2-15.el6_4.2.s390x.rpm\n\nx86_64:\nbash-debuginfo-4.1.2-15.el6_4.2.x86_64.rpm\nbash-doc-4.1.2-15.el6_4.2.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2014-7169.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-7186.html\nhttps://www.redhat.com/security/data/cve/CVE-2014-7187.html\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/articles/1200223\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2014 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFUJau9XlSAg2UNWIIRAhKkAKC931kAxA4S4exwT4uGhDr7uDFIKQCglKKS\nN0AJiOto/RXwBqHtbfr1wkM=\n=SeAK\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. Summary\n\n VMware product updates address Bash security vulnerabilities. Relevant Releases (Affected products for which remediation is present)\n\n vCenter Log Insight 2.0\n\n3. Problem Description \n\n a. Bash update for multiple products. \n\n Bash libraries have been updated in multiple products to resolve \n multiple critical security issues, also referred to as Shellshock. \n \n The Common Vulnerabilities and Exposures project (cve.mitre.org)\n has assigned the identifiers CVE-2014-6271, CVE-2014-7169, \n CVE-2014-7186, and CVE-2014-7187 to these issues. \n\n VMware products have been grouped into the following four\n product categories:\n \n I) ESXi and ESX Hypervisor\n ESXi is not affected because ESXi uses the Ash shell (through\n busybox), which is not affected by the vulnerability reported\n for the Bash shell. See table 1 for\n remediation for ESX. \n \n II) Windows-based products\n Windows-based products, including all versions of vCenter Server \n running on Windows, are not affected. \n\n III) VMware (virtual) appliances\n VMware (virtual) appliances ship with an affected version of Bash. \n See table 2 for remediation for appliances. \n \n IV) Products that run on Linux, Android, OSX or iOS (excluding\nvirtual\n appliances)\n\n Products that run on Linux, Android, OSX or iOS (excluding \n virtual appliances) might use the Bash shell that is part of the\n operating system. VMware recommends that customers\n contact their operating system vendor for a patch. \n \n MITIGATIONS\n\n VMware encourages restricting access to appliances through\n firewall rules and other network layer controls to only trusted IP\n addresses. This measure will greatly reduce any risk to these\n appliances. \n\n RECOMMENDATIONS\n\n VMware recommends customers evaluate and deploy patches for\n affected products in Table 1 and 2 below as these\n patches become available. \n\n Column 4 of the following tables lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n Table 1 - ESXi and ESX Hypervisor\n =================================\n\n VMware Product Running Replace with/\n Product Version on Apply Patch \n ============== ======= ======= =============\n ESXi any ESXi Not affected\n\n ESX 4.1 ESX Patch pending *\n\n ESX 4.0 ESX Patch pending *\n\n * VMware will make VMware ESX 4.0 and 4.1 security patches available \n for the Bash shell vulnerability. This security patch release is an \n exception to the existing VMware lifecycle policy. \n\n Table 2 - Products that are shipped as a (virtual) appliance. \n =============================================================\n\n VMware Product Running Replace with/\n Product Version on Apply Patch \n ============== ======= ======= =============\n \n vCenter Server Appliance 5.x Linux Patch Pending\n Horizon DaaS Platform 6.x Linux Patch Pending\n Horizon Workspace 1.x, 2.x Linux Patch Pending\n IT Business Management Suite 1.x Linux Patch Pending\n NSX for Multi-Hypervisor 4.x Linux Patch Pending\n NSX for vSphere 6.x Linux Patch Pending\n NVP 3.x Linux Patch Pending\n vCenter Converter Standalone 5.x Linux Patch Pending \n vCenter Hyperic Server 5.x Linux Patch Pending\n vCenter Infrastructure Navigator 5.x Linux Patch Pending\n vCenter Log Insight 1.x, 2.x Linux 2.0 U1\n vCenter Operations Manager 5.x Linux Patch Pending\n vCenter Orchestrator Appliance 4.x, 5.x Linux Patch Pending\n vCenter Site Recovery Manager 5.x Linux Patch Pending\n**\n vCenter Support Assistant 5.x Linux Patch Pending\n vCloud Automation Center 6.x Linux Patch Pending\n vCloud Automation Center\n Application Services 6.x Linux Patch Pending\n vCloud Director Appliance 5.x Linux Patch Pending\n vCloud Connector 2.x Linux Patch Pending\n vCloud Networking and Security 5.x Linux Patch Pending\n vCloud Usage Meter 3.x Linux Patch Pending\n vFabric Application Director 5.x, 6.x Linux Patch Pending\n vFabric Postgres 9.x Linux Patch Pending\n Viewplanner 3.x Linux Patch Pending\n VMware Application Dependency \n Planner x.x Linux Patch Pending\n VMware Data Recovery 2.x Linux Patch Pending\n VMware HealthAnalyzer 5.x Linux Patch Pending\n VMware Mirage Gateway 5.x Linux Patch Pending\n VMware Socialcast On Premise x.x Linux Patch Pending\n VMware Studio 2.x Linux Patch Pending\n VMware TAM Data Manager x.x Linux Patch Pending\n VMware Workbench 3.x Linux Patch Pending\n vSphere App HA 1.x Linux Patch Pending\n vSphere Big Data Extensions 1.x, 2.x Linux Patch Pending\n vSphere Data Protection 5.x Linux Patch Pending\n vSphere Management Assistant 5.x Linux Patch Pending\n vSphere Replication 5.x Linux Patch Pending\n vSphere Storage Appliance 5.x Linux Patch Pending\n\n ** This product includes Virtual Appliances that will be updated, the\nproduct \n itself is not a Virtual Appliance. Solution\n\n vCenter Log Insight\n ----------------------------\n Downloads:\n https://www.vmware.com/go/download-vcenter-log-insight\n (click Go to Downloads)\n Documentation:\n http://kb.vmware.com/kb/2091065\n\n5. References\n \n VMware Knowledge Base Article 2090740\n http://kb.vmware.com/kb/2090740\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271 , \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187\n\n- ------------------------------------------------------------------------\n\n6. Change Log\n\n 2014-09-30 VMSA-2014-0010\n Initial security advisory in conjunction with the release of\n vCenter Log Insight 2.0 U1 on 2014-09-30. Contact\n\n E-mail list for product security notifications and announcements:\n http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\n This Security Advisory is posted to the following lists:\n\n security-announce at lists.vmware.com\n bugtraq at securityfocus.com\n fulldisclosure at seclists.org\n\n E-mail: security at vmware.com\n PGP key at: http://kb.vmware.com/kb/1055\n\n VMware Security Advisories\n http://www.vmware.com/security/advisories\n\n VMware Security Response Policy\n https://www.vmware.com/support/policies/security_response.html\n\n VMware Lifecycle Policy\n https://www.vmware.com/support/policies/lifecycle.html\n \n Twitter\n https://twitter.com/VMwareSRC\n\n Copyright 2014 VMware Inc. All rights reserved. \n\nRelease Date: 2014-10-16\nLast Updated: 2014-10-16\n\nPotential Security Impact: Remote unauthorized access\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with certain HP\nStoreOnce Backup systems running Bash Shell. However, HP is unaware of any method that would\nallow this vulnerability to be exploited on HP StoreOnce Backup systems but\nis providing an updated version of Bash Shell as a precaution. \n\nReferences:\n\n CVE-2014-7169\n CVE-2014-6271\n CVE-2014-7187\n CVE-2014-7186\n SSRT101749\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP StoreOnce Backup software versions 3.0.0 to 3.11.3. \n\nPlease refer to the RESOLUTION\n section below for a list of impacted products. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-7186 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-7187 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\nHP has made the following updates available to resolve the vulnerability in\nHP StoreOnce Backup systems running Bash Shell. \n\n HP StoreOnce Backup version 3.11.4 for the following products:\n\n Product SKU\n Product Name\n\n BB896A\n HP StoreOnce 6500 Backup\n\n EJ022A\n HP StoreOnce B6200 Backup\n\n BB903A\n HP StoreOnce 4900 Backup\n\n BB877A\n HP StoreOnce 2700 Backup\n\n BB878A\n HP StoreOnce 4500 Backup\n\n BB879A\n HP StoreOnce 4700 Backup\n\n HP StoreOnce 2610 iSCSI Backup system\n\n BB852A\n HP StoreOnce 2620 iSCSI Backup system\n\n BB853A\n HP StoreOnce 4210 iSCSI Backup system\n\n BB854A\n HP StoreOnce 4210 FC Backup system\n\n BB855A\n HP StoreOnce 4220 Backup system\n\n BB856A\n HP StoreOnce 4420 Backup system\n\n BB857A\n HP StoreOnce 4430 Backup system\n\n TC458A/AAE\n HP StoreOnce VSA 10 TB 3 Year Software\n\n D4T77A/AAE\n HP StoreOnce VSA 4 TB 3 Year Software\n\nHISTORY\nVersion:1 (rev.1) - 16 October 2014 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer's patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. Relevant releases/architectures:\n\nSJIS (v. \n\nShift_JIS, also known as \"SJIS\", is a character encoding for the Japanese\nlanguage. This package provides bash support for the Shift_JIS encoding. Note that certain services, screen sessions, and tmux sessions may\nneed to be restarted, and affected interactive users may need to re-login. \nInstalling these updated packages without restarting services will address\nthe vulnerability, but functionality may be impacted until affected\nservices are restarted", sources: [ { db: "NVD", id: "CVE-2014-7187", }, { db: "JVNDB", id: "JVNDB-2014-004433", }, { db: "JVNDB", id: "JVNDB-2014-000126", }, { db: "CERT/CC", id: "VU#252743", }, { db: "BID", id: "70154", }, { db: "PACKETSTORM", id: "130988", }, { db: "PACKETSTORM", id: "128864", }, { db: "PACKETSTORM", id: "128752", }, { db: "PACKETSTORM", id: "128666", }, { db: "VULMON", id: "CVE-2014-7187", }, { db: "PACKETSTORM", id: "129264", }, { db: "PACKETSTORM", id: "128763", }, { db: "PACKETSTORM", id: "129095", }, { db: "PACKETSTORM", id: "130335", }, { db: "PACKETSTORM", id: "128456", }, { db: "PACKETSTORM", id: "128517", }, { db: "PACKETSTORM", id: "128755", }, { db: "PACKETSTORM", id: "129132", }, ], trust: 4.5, }, exploit_availability: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { reference: "https://vulmon.com/exploitdetails?qidtp=exploitdb&qid=36933", trust: 0.2, type: "exploit", }, ], sources: [ { db: "VULMON", id: "CVE-2014-7187", }, ], }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2014-7187", trust: 5.6, }, { db: "CERT/CC", id: "VU#252743", trust: 2.8, }, { db: "JVN", id: "JVN55667175", trust: 2.7, }, { db: "JVNDB", id: "JVNDB-2014-000126", trust: 2.7, }, { db: "OPENWALL", id: "OSS-SECURITY/2014/09/28/10", trust: 2.5, }, { db: "OPENWALL", id: "OSS-SECURITY/2014/09/26/2", trust: 2.5, }, { db: "OPENWALL", id: "OSS-SECURITY/2014/09/25/32", trust: 2.5, }, { db: "JVN", id: "JVNVU97219505", trust: 1.6, }, { db: "JVN", id: "JVNVU97220341", trust: 1.6, }, { db: "JVNDB", id: "JVNDB-2014-004433", trust: 1.6, }, { db: "MCAFEE", id: "SB10085", trust: 1.4, }, { db: "JUNIPER", id: "JSA10648", trust: 1.4, }, { db: "PACKETSTORM", id: "128517", trust: 1.2, }, { db: "SECUNIA", id: "61065", trust: 1.1, }, { db: "SECUNIA", id: "61622", trust: 1.1, }, { db: "SECUNIA", id: "61603", trust: 1.1, }, { db: "SECUNIA", id: "61287", trust: 1.1, }, { db: "SECUNIA", id: "61643", trust: 1.1, }, { db: "SECUNIA", id: "61618", trust: 1.1, }, { db: "SECUNIA", id: "60433", trust: 1.1, }, { db: "SECUNIA", id: "61188", trust: 1.1, }, { db: "SECUNIA", id: "61565", trust: 1.1, }, { db: "SECUNIA", id: "61312", trust: 1.1, }, { db: "SECUNIA", id: "61703", trust: 1.1, }, { db: "SECUNIA", id: "61503", trust: 1.1, }, { db: "SECUNIA", id: "61479", trust: 1.1, }, { db: "SECUNIA", id: "60034", trust: 1.1, }, { db: "SECUNIA", id: "60044", trust: 1.1, }, { db: "SECUNIA", id: "61328", trust: 1.1, }, { db: "SECUNIA", id: "59907", trust: 1.1, }, { db: "SECUNIA", id: "61129", trust: 1.1, }, { db: "SECUNIA", id: "60024", trust: 1.1, }, { db: "SECUNIA", id: "61633", trust: 1.1, }, { db: "SECUNIA", id: "61128", trust: 1.1, }, { db: "SECUNIA", id: "61313", trust: 1.1, }, { db: "SECUNIA", id: "60055", trust: 1.1, }, { db: "SECUNIA", id: "61855", trust: 1.1, }, { db: "SECUNIA", id: "61291", trust: 1.1, }, { db: "SECUNIA", id: "62343", trust: 1.1, }, { db: "SECUNIA", id: "61641", trust: 1.1, }, { db: "SECUNIA", id: "61857", trust: 1.1, }, { db: "SECUNIA", id: "61816", trust: 1.1, }, { db: "SECUNIA", id: "62312", trust: 1.1, }, { db: "SECUNIA", id: "60193", trust: 1.1, }, { db: "SECUNIA", id: "60063", trust: 1.1, }, { db: "SECUNIA", id: "61873", trust: 1.1, }, { db: "SECUNIA", id: "58200", trust: 1.1, }, { db: "SECUNIA", id: "61636", trust: 1.1, }, { db: "SECUNIA", id: "61654", trust: 1.1, }, { db: "SECUNIA", id: "61550", trust: 1.1, }, { db: "SECUNIA", id: "61283", trust: 1.1, }, { db: "SECUNIA", id: "61485", trust: 1.1, }, { db: "SECUNIA", id: "61442", trust: 1.1, }, { db: "SECUNIA", id: "61552", trust: 1.1, }, { db: "PACKETSTORM", id: "128567", trust: 1.1, }, { db: "JVN", id: "JVNVU96447236", trust: 0.8, }, { db: "USCERT", id: "TA14-268A", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2014-004431", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2014-004476", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2014-004399", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2014-004410", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2014-004432", trust: 0.8, }, { db: "ICS CERT", id: "ICSA-14-269-01A", trust: 0.8, }, { db: "ICS CERT", id: "ICSA-15-344-01", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201409-1073", trust: 0.6, }, { db: "BID", id: "70154", trust: 0.4, }, { db: "JUNIPER", id: "JSA10661", trust: 0.3, }, { db: "EXPLOIT-DB", id: "36933", trust: 0.1, }, { db: "VULMON", id: "CVE-2014-7187", trust: 0.1, }, { db: "PACKETSTORM", id: "130988", trust: 0.1, }, { db: "PACKETSTORM", id: "128864", trust: 0.1, }, { db: "PACKETSTORM", id: "128752", trust: 0.1, }, { db: "PACKETSTORM", id: "128666", trust: 0.1, }, { db: "PACKETSTORM", id: "129132", trust: 0.1, }, { db: "PACKETSTORM", id: "129264", trust: 0.1, }, { db: "PACKETSTORM", id: "128763", trust: 0.1, }, { db: "PACKETSTORM", id: "129095", trust: 0.1, }, { db: "PACKETSTORM", id: "130335", trust: 0.1, }, { db: "PACKETSTORM", id: "128456", trust: 0.1, }, { db: "PACKETSTORM", id: "128755", trust: 0.1, }, ], sources: [ { db: "CERT/CC", id: "VU#252743", }, { db: "VULMON", id: "CVE-2014-7187", }, { db: "BID", id: "70154", }, { db: "JVNDB", id: "JVNDB-2014-004433", }, { db: "JVNDB", id: "JVNDB-2014-000126", }, { db: "PACKETSTORM", id: "130988", }, { db: "PACKETSTORM", id: "128864", }, { db: "PACKETSTORM", id: "128752", }, { db: "PACKETSTORM", id: "128666", }, { db: "PACKETSTORM", id: "129132", }, { db: "PACKETSTORM", id: "129264", }, { db: "PACKETSTORM", id: "128763", }, { db: "PACKETSTORM", id: "129095", }, { db: "PACKETSTORM", id: "130335", }, { db: "PACKETSTORM", id: "128456", }, { db: "PACKETSTORM", id: "128517", }, { db: "PACKETSTORM", id: "128755", }, { db: "CNNVD", id: "CNNVD-201409-1073", }, { db: "NVD", id: "CVE-2014-7187", }, ], }, id: "VAR-201409-1148", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.4019157454999999, }, last_update_date: "2024-07-23T20:33:04.791000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "NAS-201410-05", trust: 1.6, url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { title: "APPLE-SA-2015-09-30-3 OS X El Capitan 10.11", trust: 0.8, url: "http://lists.apple.com/archives/security-announce/2015/sep/msg00008.html", }, { title: "APPLE-SA-2015-01-27-4", trust: 0.8, url: "http://lists.apple.com/archives/security-announce/2015/jan/msg00003.html", }, { title: "HT205267", trust: 0.8, url: "https://support.apple.com/en-us/ht205267", }, { title: "HT204244", trust: 0.8, url: "http://support.apple.com/en-us/ht204244", }, { title: "HT204244", trust: 0.8, url: "http://support.apple.com/ja-jp/ht204244", }, { title: "HT205267", trust: 0.8, url: "http://support.apple.com/ja-jp/ht205267", }, { title: "bash-3.2-33.AXS3.4", trust: 0.8, url: "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=3918", }, { title: "bash-4.1.2-15.AXS4.2", trust: 0.8, url: "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=3919", }, { title: "cisco-sa-20140926-bash", trust: 0.8, url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140926-bash", }, { title: "CTX200223", trust: 0.8, url: "https://support.citrix.com/article/ctx200223", }, { title: "CTX200217", trust: 0.8, url: "https://support.citrix.com/article/ctx200217", }, { title: "GNU Bash", trust: 0.8, url: "http://www.gnu.org/software/bash/", }, { title: "HPSBMU03143 SSRT101761", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04479536", }, { title: "HPSBMU03144 SSRT101762", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04479492", }, { title: "HPSBMU03182 SSRT101787", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04497042", }, { title: "HPSBHF03125 SSRT101724", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04471538", }, { title: "HPSBST03131 SSRT101749", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04477872", }, { title: "HPSBST03154 SSRT101747", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04487558", }, { title: "HPSBGN03233", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04540692", }, { title: "HPSBGN03138 SSRT101755", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04475942", }, { title: "HPSBST03129 SSRT101760", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04478866", }, { title: "HPSBST03181 SSRT101811", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04496383", }, { title: "HPSBMU03217 SSRT101827", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04512907", }, { title: "HPSBGN03142 SSRT101764", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04479402", }, { title: "HPSBMU03165 SSRT101783", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04497075", }, { title: "HPSBMU03236 SSRT101830", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04552143", }, { title: "HPSBGN03141 SSRT101763", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04479398", }, { title: "HPSBST03157 SSRT101718", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04488200", }, { title: "HPSBST03155 SSRT101747", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04487573", }, { title: "HPSBMU03245 SSRT101742", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04556845", }, { title: "HPSBST03148 SSRT101749", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04479974", }, { title: "HPSBMU03246 SSRT101743", trust: 0.8, url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c04558068", }, { title: "1685541", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", }, { title: "1685604", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { title: "S1004915", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004915", }, { title: "1685733", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { title: "T1021272", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021272", }, { title: "1686131", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { title: "S1004879", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004879", }, { title: "MIGR-5096315", trust: 0.8, url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096315", }, { title: "S1004897", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004897", }, { title: "1685749", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { title: "S1004898", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004898", }, { title: "1685433", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685433", }, { title: "1685914", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { title: "1686479", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { title: "1685522", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685522", }, { title: "T1021279", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021279", }, { title: "1686447", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", }, { title: "1686084", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", }, { title: "1686493", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686493", }, { title: "1685798", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685798", }, { title: "1686299", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686299", }, { title: "1686635", trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686635", }, { title: "アライドテレシス株式会社からの情報", trust: 0.8, url: "http://jvn.jp/vu/jvnvu97219505/522154/index.html", }, { title: "ZENworks Configuration Management vulnerability with GNU Bash Remote Code Execution (aka ShellShock)", trust: 0.8, url: "https://www.novell.com/support/kb/doc.php?id=7015721", }, { title: "OES11 SP2, OES11SP1, OES2 SP3 vulnerability with GNU Bash Remote Code Execution (aka ShellShock) and Mozilla NSS vulnerabilities", trust: 0.8, url: "http://www.novell.com/support/kb/doc.php?id=7015701", }, { title: "AV14-003", trust: 0.8, url: "http://jpn.nec.com/security-info/av14-003.html", }, { title: "Bash \"Shellshock\" Vulnerabilities - CVE-2014-7169", trust: 0.8, url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { title: "Bug 1141597", trust: 0.8, url: "https://bugzilla.redhat.com/show_bug.cgi?id=1141597", }, { title: "Resolution for Bash Code Injection Vulnerability via Specially Crafted Environment Variables (CVE-2014-6271, CVE-2014-7169) in Red Hat Enterprise Linux", trust: 0.8, url: "https://access.redhat.com/solutions/1207723", }, { title: "RHSA-2014:1354", trust: 0.8, url: "https://rhn.redhat.com/errata/rhsa-2014-1354.html", }, { title: "RHSA-2014:1306", trust: 0.8, url: "https://rhn.redhat.com/errata/rhsa-2014-1306.html", }, { title: "Bash specially-crafted environment variables code injection attack", trust: 0.8, url: "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/", }, { title: "GNU Bash 「OS コマンドインジェクション」の脆弱性について", trust: 0.8, url: "http://www.rtpro.yamaha.co.jp/rt/faq/security/vu252743.html", }, { title: "SA82", trust: 0.8, url: "https://bto.bluecoat.com/security-advisory/sa82", }, { title: "SOL15629", trust: 0.8, url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { title: "Multiple vulnerabilities in Bash", trust: 0.8, url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_bash", }, { title: "JSA10648", trust: 0.8, url: "https://kb.juniper.net/infocenter/index?page=content&id=jsa10648", }, { title: "VMSA-2014-0010", trust: 0.8, url: "http://www.vmware.com/security/advisories/vmsa-2014-0010.html", }, { title: "GNU bash の脆弱性に関する弊社調査・対応状況について", trust: 0.8, url: "http://www.iodata.jp/support/information/2014/bash/", }, { title: "bashの脆弱性(CVE-2014-6271,CVE-2014-7169 他)によるHA8500への影響について", trust: 0.8, url: "http://www.hitachi.co.jp/products/it/server/security/info/vulnerable/bash_ha8500.html", }, { title: "サーバ・クライアント製品 bashの脆弱性(CVE-2014-6271,CVE-2014-7169他)による影響について", trust: 0.8, url: "http://www.hitachi.co.jp/products/it/server/security/info/vulnerable/bash_cve20146271.html", }, { title: "cisco-sa-20140926-bash", trust: 0.8, url: "http://www.cisco.com/cisco/web/support/jp/112/1126/1126247_cisco-sa-20140926-bash-j.html", }, { title: "TLSA-2014-9", trust: 0.8, url: "http://www.turbolinux.co.jp/security/2014/tlsa-2014-9j.html", }, { title: "GNU BashにおけるOSコマンドインジェクションの脆弱性", trust: 0.8, url: "http://buffalo.jp/support_s/s20141002.html", }, { title: "GNU Bash に OS コマンドインジェクションの脆弱性", trust: 0.8, url: "http://software.fujitsu.com/jp/security/vulnerabilities/jvn-97219505.html", }, { title: "bash4.1.2-15.el6_5.2.x86_64", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54163", }, { title: "bash-4.2-cve-2014-7169-2", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=54162", }, { title: "Ubuntu Security Notice: bash vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-2364-1", }, { title: "Red Hat: CVE-2014-7187", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=cve-2014-7187", }, { title: "Amazon Linux AMI: ALAS-2014-419", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=alas-2014-419", }, { title: "VMware Security Advisories: VMware product updates address critical Bash security vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories&qid=86cb6b3955e100fdc9667a7ca916c772", }, { title: "Symantec Security Advisories: SA82 : GNU Bash Shellshock Command Injection Vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=2b57ceaadfde2a8b03482273e1fd21ea", }, { title: "Apple: OS X Yosemite v10.10.2 and Security Update 2015-001", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=64cbe709a7be49c91d8a8b0f43621640", }, { title: "Tenable Security Advisories: [R7] Tenable Appliance Affected by GNU bash 'Shellshock' Vulnerability", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories&qid=tns-2014-07", }, { title: "Citrix Security Bulletins: Citrix XenServer Shellshock Security Update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=64ae0aae8269062686789e3a3fa1d2bf", }, { title: "Citrix Security Bulletins: Citrix Security Advisory for GNU Bash Shellshock Vulnerabilities", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=73443a6db89dc66fc6bcb49f85bfd1ab", }, { title: "Apple: OS X El Capitan v10.11", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=e88bab658248444f5dffc23fd95859e7", }, { title: "Shell-Shock-Update", trust: 0.1, url: "https://github.com/umdterps/shell-shock-update ", }, { title: "fabric-shellshock", trust: 0.1, url: "https://github.com/ericlake/fabric-shellshock ", }, { title: "dokku-alt", trust: 0.1, url: "https://github.com/dokku-alt/dokku-alt ", }, { title: "patch-bash-shellshock", trust: 0.1, url: "https://github.com/jdauphant/patch-bash-shellshock ", }, { title: "w-test", trust: 0.1, url: "https://github.com/inspirion87/w-test ", }, { title: "linux-pentest", trust: 0.1, url: "https://github.com/ankh2054/linux-pentest ", }, { title: "shocktrooper", trust: 0.1, url: "https://github.com/evank/shocktrooper ", }, { title: "ShellShockHunter", trust: 0.1, url: "https://github.com/mrcl0wnlab/shellshockhunter ", }, { title: "shellshockFixOSX", trust: 0.1, url: "https://github.com/opragel/shellshockfixosx ", }, { title: "Xpl-SHELLSHOCK-Ch3ck", trust: 0.1, url: "https://github.com/googleinurl/xpl-shellshock-ch3ck ", }, { title: "bashcheck", trust: 0.1, url: "https://github.com/hannob/bashcheck ", }, { title: "shellshocker-pocs", trust: 0.1, url: "https://github.com/mubix/shellshocker-pocs ", }, { title: "Threatpost", trust: 0.1, url: "https://threatpost.com/researcher-takes-wraps-off-two-undisclosed-shellshock-vulnerabilities-in-bash/108674/", }, { title: "Threatpost", trust: 0.1, url: "https://threatpost.com/vmware-begins-to-patch-bash-issues-across-product-line/108632/", }, ], sources: [ { db: "VULMON", id: "CVE-2014-7187", }, { db: "JVNDB", id: "JVNDB-2014-004433", }, { db: "JVNDB", id: "JVNDB-2014-000126", }, { db: "CNNVD", id: "CNNVD-201409-1073", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-119", trust: 1.8, }, { problemtype: "OS Command injection (CWE-78) [IPA evaluation ]", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2014-004433", }, { db: "JVNDB", id: "JVNDB-2014-000126", }, { db: "NVD", id: "CVE-2014-7187", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.5, url: "http://openwall.com/lists/oss-security/2014/09/28/10", }, { trust: 2.5, url: "http://openwall.com/lists/oss-security/2014/09/25/32", }, { trust: 2.5, url: "http://openwall.com/lists/oss-security/2014/09/26/2", }, { trust: 2.2, url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140926-bash", }, { trust: 2.2, url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10085", }, { trust: 1.9, url: "https://kb.bluecoat.com/index?page=content&id=sa82", }, { trust: 1.9, url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { trust: 1.7, url: "http://www.kb.cert.org/vuls/id/252743", }, { trust: 1.6, url: "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/", }, { trust: 1.6, url: "http://www.ipa.go.jp/security/ciadr/vul/20140926-bash.html", }, { trust: 1.6, url: "http://jvn.jp/jp/jvn55667175/index.html", }, { trust: 1.6, url: "http://jvn.jp/vu/jvnvu97219505/index.html", }, { trust: 1.6, url: "http://jvn.jp/vu/jvnvu97220341/index.html", }, { trust: 1.6, url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-7187", }, { trust: 1.5, url: "http://rhn.redhat.com/errata/rhsa-2014-1311.html", }, { trust: 1.4, url: "http://rhn.redhat.com/errata/rhsa-2014-1312.html", }, { trust: 1.4, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { trust: 1.4, url: "https://kb.juniper.net/infocenter/index?page=content&id=jsa10648", }, { trust: 1.4, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { trust: 1.4, url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021272", }, { trust: 1.4, url: "http://www.vmware.com/security/advisories/vmsa-2014-0010.html", }, { trust: 1.4, url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { trust: 1.4, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", }, { trust: 1.4, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004898", }, { trust: 1.4, url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021279", }, { trust: 1.4, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004897", }, { trust: 1.4, url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096315", }, { trust: 1.4, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004915", }, { trust: 1.4, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { trust: 1.4, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { trust: 1.4, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { trust: 1.4, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { trust: 1.2, url: "https://nvd.nist.gov/vuln/detail/cve-2014-7186", }, { trust: 1.2, url: "https://nvd.nist.gov/vuln/detail/cve-2014-7169", }, { trust: 1.2, url: "https://nvd.nist.gov/vuln/detail/cve-2014-7187", }, { trust: 1.1, url: "https://www.suse.com/support/shellshock/", }, { trust: 1.1, url: "http://support.novell.com/security/cve/cve-2014-7187.html", }, { trust: 1.1, url: "http://secunia.com/advisories/61479", }, { trust: 1.1, url: "http://secunia.com/advisories/61641", }, { trust: 1.1, url: "http://secunia.com/advisories/61618", }, { trust: 1.1, url: "http://secunia.com/advisories/61622", }, { trust: 1.1, url: "http://secunia.com/advisories/61636", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", }, { trust: 1.1, url: "http://www.ubuntu.com/usn/usn-2364-1", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", }, { trust: 1.1, url: "http://secunia.com/advisories/61485", }, { trust: 1.1, url: "http://secunia.com/advisories/59907", }, { trust: 1.1, url: "http://secunia.com/advisories/61654", }, { trust: 1.1, url: "http://packetstormsecurity.com/files/128567/ca-technologies-gnu-bash-shellshock.html", }, { trust: 1.1, url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { trust: 1.1, url: "http://secunia.com/advisories/61565", }, { trust: 1.1, url: "http://secunia.com/advisories/61643", }, { trust: 1.1, url: "http://secunia.com/advisories/61503", }, { trust: 1.1, url: "http://secunia.com/advisories/61633", }, { trust: 1.1, url: "http://secunia.com/advisories/61552", }, { trust: 1.1, url: "http://secunia.com/advisories/61703", }, { trust: 1.1, url: "http://seclists.org/fulldisclosure/2014/oct/0", }, { trust: 1.1, url: "http://secunia.com/advisories/61283", }, { trust: 1.1, url: "http://secunia.com/advisories/61603", }, { trust: 1.1, url: "http://packetstormsecurity.com/files/128517/vmware-security-advisory-2014-0010.html", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { trust: 1.1, url: "http://secunia.com/advisories/61188", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { trust: 1.1, url: "https://support.citrix.com/article/ctx200217", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004879", }, { trust: 1.1, url: "http://secunia.com/advisories/60034", }, { trust: 1.1, url: "http://secunia.com/advisories/61816", }, { trust: 1.1, url: "http://secunia.com/advisories/61128", }, { trust: 1.1, url: "http://secunia.com/advisories/61313", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { trust: 1.1, url: "http://secunia.com/advisories/61442", }, { trust: 1.1, url: "http://secunia.com/advisories/61287", }, { trust: 1.1, url: "https://support.citrix.com/article/ctx200223", }, { trust: 1.1, url: "http://secunia.com/advisories/60055", }, { trust: 1.1, url: "http://secunia.com/advisories/61129", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { trust: 1.1, url: "http://secunia.com/advisories/58200", }, { trust: 1.1, url: "http://secunia.com/advisories/61328", }, { trust: 1.1, url: "http://secunia.com/advisories/61857", }, { trust: 1.1, url: "http://secunia.com/advisories/60193", }, { trust: 1.1, url: "http://secunia.com/advisories/61065", }, { trust: 1.1, url: "http://secunia.com/advisories/61550", }, { trust: 1.1, url: "http://secunia.com/advisories/61855", }, { trust: 1.1, url: "http://secunia.com/advisories/61312", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { trust: 1.1, url: "http://secunia.com/advisories/60063", }, { trust: 1.1, url: "http://secunia.com/advisories/61291", }, { trust: 1.1, url: "http://secunia.com/advisories/60044", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { trust: 1.1, url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk102673&src=securityalerts", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021361", }, { trust: 1.1, url: "http://secunia.com/advisories/60433", }, { trust: 1.1, url: "http://secunia.com/advisories/60024", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { trust: 1.1, url: "http://jvn.jp/en/jp/jvn55667175/index.html", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141383138121313&w=2", }, { trust: 1.1, url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { trust: 1.1, url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", }, { trust: 1.1, url: "http://jvndb.jvn.jp/jvndb/jvndb-2014-000126", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { trust: 1.1, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", }, { trust: 1.1, url: "http://rhn.redhat.com/errata/rhsa-2014-1354.html", }, { trust: 1.1, url: "http://secunia.com/advisories/61873", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141694386919794&w=2", }, { trust: 1.1, url: "http://secunia.com/advisories/62343", }, { trust: 1.1, url: "http://secunia.com/advisories/62312", }, { trust: 1.1, url: "http://lists.apple.com/archives/security-announce/2015/jan/msg00003.html", }, { trust: 1.1, url: "http://support.apple.com/ht204244", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { trust: 1.1, url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { trust: 1.1, url: "http://www.mandriva.com/security/advisories?name=mdvsa-2015:164", }, { trust: 1.1, url: "http://lists.apple.com/archives/security-announce/2015/sep/msg00008.html", }, { trust: 1.1, url: "https://support.apple.com/ht205267", }, { trust: 1.1, url: "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c04518183", }, { trust: 1.1, url: "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-c04497075", }, { trust: 1.1, url: "http://www.securityfocus.com/archive/1/533593/100/0/threaded", }, { trust: 1, url: "https://access.redhat.com/articles/1200223", }, { trust: 1, url: "https://nvd.nist.gov/vuln/detail/cve-2014-6271", }, { trust: 0.9, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-7187", }, { trust: 0.9, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/", }, { trust: 0.9, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/", }, { trust: 0.9, url: "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins", }, { trust: 0.8, url: "http://seclists.org/oss-sec/2014/q3/650", }, { trust: 0.8, url: "http://seclists.org/oss-sec/2014/q3/688", }, { trust: 0.8, url: "http://seclists.org/oss-sec/2014/q3/685", }, { trust: 0.8, url: "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html", }, { trust: 0.8, url: "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", }, { trust: 0.8, url: "https://gist.github.com/anonymous/929d622f3b36b00c0be1", }, { trust: 0.8, url: "https://www.dfranke.us/posts/2014-09-27-shell-shock-exploitation-vectors.html", }, { trust: 0.8, url: "https://shellshocker.net/#", }, { trust: 0.8, url: "http://support.apple.com/kb/ht6495", }, { trust: 0.8, url: "https://www.barracuda.com/support/techalerts", }, { trust: 0.8, url: "http://www.checkpoint.com/blog/protecting-shellshock/index.html", }, { trust: 0.8, url: "http://securityadvisories.dlink.com/security/publication.aspx?name=sap10044", }, { trust: 0.8, url: "https://www.debian.org/security/2014/dsa-3032", }, { trust: 0.8, url: "http://learn.extremenetworks.com/rs/extreme/images/vn-2014-001-%20gnu%20bash%20threats%20-cve-2014-7169%20rev01.pdf", }, { trust: 0.8, url: "http://fedoramagazine.org/shellshock-update-bash-packages-that-resolve-cve-2014-6271-and-cve-2014-7169-available/", }, { trust: 0.8, url: "http://www.fortiguard.com/advisory/fg-ir-14-030/", }, { trust: 0.8, url: "http://www.gentoo.org/security/en/glsa/glsa-201409-09.xml", }, { trust: 0.8, url: "http://alerts.hp.com/r?2.1.3kt.2zr.15ee22.l8mgqe..n.ghvs.8f9a.bw89mq%5f%5fdbosfqk0", }, { trust: 0.8, url: "http://kb.juniper.net/jsa10648", }, { trust: 0.8, url: "http://jpn.nec.com/security-info/av14-003.html", }, { trust: 0.8, url: "http://support.novell.com/security/cve/cve-2014-6271.html", }, { trust: 0.8, url: "https://www.suse.com/support/kb/doc.php?id=7015702", }, { trust: 0.8, url: "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.522193", }, { trust: 0.8, url: "http://www.ubuntu.com/usn/usn-2362-1/", }, { trust: 0.8, url: "http://kb.vmware.com/selfservice/microsites/search.do?language=en_us&cmd=displaykc&externalid=2090740", }, { trust: 0.8, url: "http://pkgsrc.se/files.php?messageid=20140925202832.9ad9c98@cvs.netbsd.org", }, { trust: 0.8, url: "https://www.jpcert.or.jp/at/2014/at140037.html", }, { trust: 0.8, url: "http://jvn.jp/vu/jvnvu96447236/index.html", }, { trust: 0.8, url: "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-000126.html", }, { trust: 0.8, url: "https://www.us-cert.gov/ncas/alerts/ta14-268a", }, { trust: 0.8, url: "http://www.aratana.jp/security/detail.php?id=10", }, { trust: 0.8, url: "http://lcamtuf.blogspot.jp/2014/09/bash-bug-apply-unofficial-patch-now.html", }, { trust: 0.8, url: "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004399.html", }, { trust: 0.8, url: "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004410.html", }, { trust: 0.8, url: "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004431.html", }, { trust: 0.8, url: "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004476.html", }, { trust: 0.8, url: "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004432.html", }, { trust: 0.8, url: "http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-004433.html", }, { trust: 0.8, url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-7169", }, { trust: 0.8, url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-6271", }, { trust: 0.8, url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-6277", }, { trust: 0.8, url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-6278", }, { trust: 0.8, url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-7186", }, { trust: 0.8, url: "https://ics-cert.us-cert.gov/advisories/icsa-15-344-01", }, { trust: 0.8, url: "https://www.cisa.gov/news-events/ics-advisories/icsa-14-269-01a", }, { trust: 0.7, url: "https://nvd.nist.gov/vuln/detail/cve-2014-6277", }, { trust: 0.7, url: "https://nvd.nist.gov/vuln/detail/cve-2014-6278", }, { trust: 0.3, url: "http://www.gnu.org/software/bash/", }, { trust: 0.3, url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk102673", }, { trust: 0.3, url: "https://kc.mcafee.com/corporate/index?page=content&id=kb83017", }, { trust: 0.3, url: "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_bash", }, { trust: 0.3, url: "http://www.oracle.com/technetwork/topics/security/alert-cve-2014-7169-2303276.html", }, { trust: 0.3, url: "http://seclists.org/oss-sec/2014/q3/735", }, { trust: 0.3, url: "https://www-304.ibm.com/connections/blogs/psirt/entry/security_bulletin_vulnerabilities_in_bash_affect_certain_qlogic_products_that_ibm_resells_for_bladecenter_and_flex_system_products_cve_2014_6271_c", }, { trust: 0.3, url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-notices/archive/hw-372538.htm", }, { trust: 0.3, url: "http://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html?ref=rss", }, { trust: 0.3, url: "http://googlechromereleases.blogspot.com/2014/10/stable-channel-update-for-chrome-os.html", }, { trust: 0.3, url: "http://www.ibm.com/support/docview.wss?uid=ssg1s1004932", }, { trust: 0.3, url: "http://www.ibm.com/support/docview.wss?uid=swg21686433", }, { trust: 0.3, url: "http://www.ibm.com/support/docview.wss?uid=isg3t1021361", }, { trust: 0.3, url: "http://www.ibm.com/support/docview.wss?uid=swg21686494", }, { trust: 0.3, url: "http://www.ibm.com/support/docview.wss?uid=swg21686445", }, { trust: 0.3, url: "http://www.ibm.com/support/docview.wss?uid=ssg1s1004903", }, { trust: 0.3, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004928", }, { trust: 0.3, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004911", }, { trust: 0.3, url: "http://www.ibm.com/support/docview.wss?uid=swg21686479", }, { trust: 0.3, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04497075", }, { trust: 0.3, url: "http://seclists.org/fulldisclosure/2014/oct/25", }, { trust: 0.3, url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04552143", }, { trust: 0.3, url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10661&cat=sirt_1&actp=list", }, { trust: 0.3, url: "https://downloads.avaya.com/css/p8/documents/100183066", }, { trust: 0.3, url: "https://downloads.avaya.com/css/p8/documents/100183009", }, { trust: 0.3, url: "https://lists.gnu.org/archive/html/bug-bash/2014-10/msg00000.html", }, { trust: 0.3, url: "http://www.kb.cert.org/vuls/id/bluu-9paps5", }, { trust: 0.3, url: "https://downloads.avaya.com/css/p8/documents/100183222", }, { trust: 0.3, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479398", }, { trust: 0.3, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479402", }, { trust: 0.3, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479492", }, { trust: 0.3, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04475942", }, { trust: 0.3, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04488200", }, { trust: 0.3, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04478866", }, { trust: 0.3, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04477872", }, { trust: 0.3, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04479536", }, { trust: 0.3, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04540692", }, { trust: 0.3, url: "http://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04561445", }, { trust: 0.3, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04471546", }, { trust: 0.3, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04471538", }, { trust: 0.3, url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04497042", }, { trust: 0.3, url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04512907 ", }, { trust: 0.3, url: "http://seclists.org/bugtraq/2015/feb/76", }, { trust: 0.3, url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04558068", }, { trust: 0.3, url: "http://seclists.org/bugtraq/2015/feb/77", }, { trust: 0.3, url: "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04479974", }, { trust: 0.3, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04487558", }, { trust: 0.3, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04487573", }, { trust: 0.3, url: "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04496383", }, { trust: 0.3, url: "http://www.kb.cert.org/vuls/id/bluu-9paptm", }, { trust: 0.3, url: "http://www.kb.cert.org/vuls/id/bluu-9paptz", }, { trust: 0.3, url: "https://www.xerox.com/download/security/security-bulletin/1a2e5-5116a33c2fb27/cert_security_mini-_bulletin_xrx15k_for_77xx_r15-03_v1.0.pdf", }, { trust: 0.3, url: "https://www.xerox.com/download/security/security-bulletin/2b8d8-513128526dd97/cert_security_mini-_bulletin_xrx15m_for_wc75xx_v1_1.pdf", }, { trust: 0.3, url: "https://www.xerox.com/download/security/security-bulletin/2eeef-51056e459c6d8/cert_security_mini-_bulletin_xrx15h_for_p7800_v1_0.pdf", }, { trust: 0.3, url: "https://www.xerox.com/download/security/security-bulletin/2a20e-5105457a515cc/cert_security_mini-_bulletin_xrx15e_for_wc57xx_v1_0.pdf", }, { trust: 0.3, url: "https://www.xerox.com/download/security/security-bulletin/2a901-510567b876a35/cert_security_mini-_bulletin_xrx15g_for_p6700_v1_0.pdf", }, { trust: 0.3, url: "https://www.xerox.com/download/security/security-bulletin/29a7e-50e49f9c009f9/cert_security_mini_bulletin_xrx14g_for_77xx_v1.1.pdf", }, { trust: 0.3, url: "https://www.xerox.com/download/security/security-bulletin/1a7a1-50f12e334b734/cert_security_mini-_bulletin_xrx14h_for_wc59xx_v1.pdf", }, { trust: 0.3, url: "https://www.xerox.com/download/security/security-bulletin/2df3c-51055b159fd50/cert_security_mini_bulletin_xrx15f_for_connectkey_1.5_v1-01.pdf", }, { trust: 0.3, url: "https://rhn.redhat.com/errata/rhsa-2014-1306.html", }, { trust: 0.3, url: "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/archive/hw-377648.htm", }, { trust: 0.3, url: "https://www-304.ibm.com/support/docview.wss?uid=swg21686447", }, { trust: 0.3, url: "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004982", }, { trust: 0.3, url: "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004879", }, { trust: 0.3, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685873", }, { trust: 0.3, url: "https://www-304.ibm.com/support/docview.wss?uid=swg21686132", }, { trust: 0.3, url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096533", }, { trust: 0.3, url: "https://www-304.ibm.com/support/docview.wss?uid=swg21686024", }, { trust: 0.3, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686037", }, { trust: 0.3, url: "https://www-304.ibm.com/support/docview.wss?uid=swg21685733", }, { trust: 0.3, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686171", }, { trust: 0.3, url: "https://www-304.ibm.com/support/docview.wss?uid=swg21686098", }, { trust: 0.3, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685875", }, { trust: 0.3, url: "https://www-304.ibm.com/support/docview.wss?uid=nas8n1020272", }, { trust: 0.3, url: "https://www-304.ibm.com/support/docview.wss?uid=swg21685541", }, { trust: 0.3, url: "https://www-304.ibm.com/support/docview.wss?uid=ssg1s1004905", }, { trust: 0.3, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685673", }, { trust: 0.3, url: "https://www-304.ibm.com/support/docview.wss?uid=swg21685837", }, { trust: 0.3, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687971", }, { trust: 0.3, url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685691", }, { trust: 0.3, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004933", }, { trust: 0.3, url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096503", }, { trust: 0.3, url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004945", }, { trust: 0.3, url: "https://downloads.avaya.com/css/p8/documents/100183088", }, { trust: 0.3, url: "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetsea", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2014-7187", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2104-6277", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2104-6278", }, { trust: 0.2, url: "https://www.redhat.com/mailman/listinfo/rhsa-announce", }, { trust: 0.2, url: "https://bugzilla.redhat.com/):", }, { trust: 0.2, url: "https://access.redhat.com/articles/11258", }, { trust: 0.2, url: "https://access.redhat.com/security/team/contact/", }, { trust: 0.2, url: "https://access.redhat.com/security/updates/classification/#important", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/119.html", }, { trust: 0.1, url: "https://www.securityfocus.com/bid/70154", }, { trust: 0.1, url: "http://tools.cisco.com/security/center/viewalert.x?alertid=35861", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://usn.ubuntu.com/2364-1/", }, { trust: 0.1, url: "https://www.exploit-db.com/exploits/36933/", }, { trust: 0.1, url: "https://softwaresupport.hp.com/group/softwaresupport/search-result/-/facetse", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2014-7169", }, { trust: 0.1, url: "https://rhn.redhat.com/errata/rhsa-2014-1865.html", }, { trust: 0.1, url: "https://access.redhat.com/security/team/key/", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2014-7186", }, { trust: 0.1, url: "http://support.openview.hp.com/selfsolve/document/km01194258", }, { trust: 0.1, url: "https://www.redhat.com/security/data/cve/cve-2014-7169.html", }, { trust: 0.1, url: "https://www.redhat.com/security/data/cve/cve-2014-7186.html", }, { trust: 0.1, url: "https://www.redhat.com/security/data/cve/cve-2014-7187.html", }, { trust: 0.1, url: "https://access.redhat.com/security/team/key/#package", }, { trust: 0.1, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-7169", }, { trust: 0.1, url: "https://www.vmware.com/go/download-vcenter-log-insight", }, { trust: 0.1, url: "https://twitter.com/vmwaresrc", }, { trust: 0.1, url: "https://www.vmware.com/support/policies/lifecycle.html", }, { trust: 0.1, url: "http://kb.vmware.com/kb/2091065", }, { trust: 0.1, url: "http://kb.vmware.com/kb/2090740", }, { trust: 0.1, url: "http://kb.vmware.com/kb/1055", }, { trust: 0.1, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-7186", }, { trust: 0.1, url: "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce", }, { trust: 0.1, url: "http://www.vmware.com/security/advisories", }, { trust: 0.1, url: "https://www.vmware.com/support/policies/security_response.html", }, { trust: 0.1, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-6271", }, ], sources: [ { db: "CERT/CC", id: "VU#252743", }, { db: "VULMON", id: "CVE-2014-7187", }, { db: "BID", id: "70154", }, { db: "JVNDB", id: "JVNDB-2014-004433", }, { db: "JVNDB", id: "JVNDB-2014-000126", }, { db: "PACKETSTORM", id: "130988", }, { db: "PACKETSTORM", id: "128864", }, { db: "PACKETSTORM", id: "128752", }, { db: "PACKETSTORM", id: "128666", }, { db: "PACKETSTORM", id: "129132", }, { db: "PACKETSTORM", id: "129264", }, { db: "PACKETSTORM", id: "128763", }, { db: "PACKETSTORM", id: "129095", }, { db: "PACKETSTORM", id: "130335", }, { db: "PACKETSTORM", id: "128456", }, { db: "PACKETSTORM", id: "128517", }, { db: "PACKETSTORM", id: "128755", }, { db: "CNNVD", id: "CNNVD-201409-1073", }, { db: "NVD", id: "CVE-2014-7187", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CERT/CC", id: "VU#252743", }, { db: "VULMON", id: "CVE-2014-7187", }, { db: "BID", id: "70154", }, { db: "JVNDB", id: "JVNDB-2014-004433", }, { db: "JVNDB", id: "JVNDB-2014-000126", }, { db: "PACKETSTORM", id: "130988", }, { db: "PACKETSTORM", id: "128864", }, { db: "PACKETSTORM", id: "128752", }, { db: "PACKETSTORM", id: "128666", }, { db: "PACKETSTORM", id: "129132", }, { db: "PACKETSTORM", id: "129264", }, { db: "PACKETSTORM", id: "128763", }, { db: "PACKETSTORM", id: "129095", }, { db: "PACKETSTORM", id: "130335", }, { db: "PACKETSTORM", id: "128456", }, { db: "PACKETSTORM", id: "128517", }, { db: "PACKETSTORM", id: "128755", }, { db: "CNNVD", id: "CNNVD-201409-1073", }, { db: "NVD", id: "CVE-2014-7187", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2014-09-25T00:00:00", db: "CERT/CC", id: "VU#252743", }, { date: "2014-09-28T00:00:00", db: "VULMON", id: "CVE-2014-7187", }, { date: "2014-09-25T00:00:00", db: "BID", id: "70154", }, { date: "2014-09-30T00:00:00", db: "JVNDB", id: "JVNDB-2014-004433", }, { date: "2014-10-28T00:00:00", db: "JVNDB", id: "JVNDB-2014-000126", }, { date: "2015-03-24T17:07:02", db: "PACKETSTORM", id: "130988", }, { date: "2014-10-27T23:44:00", db: "PACKETSTORM", id: "128864", }, { date: "2014-10-20T13:14:00", db: "PACKETSTORM", id: "128752", }, { date: "2014-10-14T23:07:16", db: "PACKETSTORM", id: "128666", }, { date: "2014-11-17T23:31:07", db: "PACKETSTORM", id: "129132", }, { date: "2014-11-26T15:07:58", db: "PACKETSTORM", id: "129264", }, { date: "2014-10-20T17:55:00", db: "PACKETSTORM", id: "128763", }, { date: "2014-11-13T17:15:31", db: "PACKETSTORM", id: "129095", }, { date: "2015-02-10T17:43:19", db: "PACKETSTORM", id: "130335", }, { date: "2014-09-27T16:45:44", db: "PACKETSTORM", id: "128456", }, { date: "2014-10-01T22:22:00", db: "PACKETSTORM", id: "128517", }, { date: "2014-10-20T14:02:00", db: "PACKETSTORM", id: "128755", }, { date: "2014-09-29T00:00:00", db: "CNNVD", id: "CNNVD-201409-1073", }, { date: "2014-09-28T19:55:06.270000", db: "NVD", id: "CVE-2014-7187", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2015-04-14T00:00:00", db: "CERT/CC", id: "VU#252743", }, { date: "2018-10-09T00:00:00", db: "VULMON", id: "CVE-2014-7187", }, { date: "2015-11-03T19:52:00", db: "BID", id: "70154", }, { date: "2015-12-24T00:00:00", db: "JVNDB", id: "JVNDB-2014-004433", }, { date: "2024-07-18T02:27:00", db: "JVNDB", id: "JVNDB-2014-000126", }, { date: "2014-09-29T00:00:00", db: "CNNVD", id: "CNNVD-201409-1073", }, { date: "2018-10-09T19:52:54.273000", db: "NVD", id: "CVE-2014-7187", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "PACKETSTORM", id: "129132", }, { db: "PACKETSTORM", id: "128456", }, { db: "CNNVD", id: "CNNVD-201409-1073", }, ], trust: 0.8, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "GNU Bash shell executes commands in exported functions in environment variables", sources: [ { db: "CERT/CC", id: "VU#252743", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "buffer overflow", sources: [ { db: "CNNVD", id: "CNNVD-201409-1073", }, ], trust: 0.6, }, }
ghsa-8m22-gm6f-5487
Vulnerability from github
Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
{ affected: [], aliases: [ "CVE-2014-7187", ], database_specific: { cwe_ids: [ "CWE-119", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2014-09-28T19:55:00Z", severity: "HIGH", }, details: "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", id: "GHSA-8m22-gm6f-5487", modified: "2022-05-14T02:51:13Z", published: "2022-05-14T02:51:13Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", }, { type: "WEB", url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { type: "WEB", url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { type: "WEB", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { type: "WEB", url: "https://support.apple.com/HT205267", }, { type: "WEB", url: "https://support.citrix.com/article/CTX200217", }, { type: "WEB", url: "https://support.citrix.com/article/CTX200223", }, { type: "WEB", url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { type: "WEB", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { type: "WEB", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { type: "WEB", url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { type: "WEB", url: "https://www.suse.com/support/shellshock", }, { type: "WEB", url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { type: "WEB", url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { type: "WEB", url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { type: "WEB", url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141383138121313&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141694386919794&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { type: "WEB", url: "http://openwall.com/lists/oss-security/2014/09/25/32", }, { type: "WEB", url: "http://openwall.com/lists/oss-security/2014/09/26/2", }, { type: "WEB", url: "http://openwall.com/lists/oss-security/2014/09/28/10", }, { type: "WEB", url: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", }, { type: "WEB", url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { type: "WEB", url: "http://rhn.redhat.com/errata/RHSA-2014-1311.html", }, { type: "WEB", url: "http://rhn.redhat.com/errata/RHSA-2014-1312.html", }, { type: "WEB", url: "http://rhn.redhat.com/errata/RHSA-2014-1354.html", }, { type: "WEB", url: "http://seclists.org/fulldisclosure/2014/Oct/0", }, { type: "WEB", url: "http://secunia.com/advisories/58200", }, { type: "WEB", url: "http://secunia.com/advisories/59907", }, { type: "WEB", url: "http://secunia.com/advisories/60024", }, { type: "WEB", url: "http://secunia.com/advisories/60034", }, { type: "WEB", url: "http://secunia.com/advisories/60044", }, { type: "WEB", url: "http://secunia.com/advisories/60055", }, { type: "WEB", url: "http://secunia.com/advisories/60063", }, { type: "WEB", url: "http://secunia.com/advisories/60193", }, { type: "WEB", url: "http://secunia.com/advisories/60433", }, { type: "WEB", url: "http://secunia.com/advisories/61065", }, { type: "WEB", url: "http://secunia.com/advisories/61128", }, { type: "WEB", url: "http://secunia.com/advisories/61129", }, { type: "WEB", url: "http://secunia.com/advisories/61188", }, { type: "WEB", url: "http://secunia.com/advisories/61283", }, { type: "WEB", url: "http://secunia.com/advisories/61287", }, { type: "WEB", url: "http://secunia.com/advisories/61291", }, { type: "WEB", url: "http://secunia.com/advisories/61312", }, { type: "WEB", url: "http://secunia.com/advisories/61313", }, { type: "WEB", url: "http://secunia.com/advisories/61328", }, { type: "WEB", url: "http://secunia.com/advisories/61442", }, { type: "WEB", url: "http://secunia.com/advisories/61479", }, { type: "WEB", url: "http://secunia.com/advisories/61485", }, { type: "WEB", url: "http://secunia.com/advisories/61503", }, { type: "WEB", url: "http://secunia.com/advisories/61550", }, { type: "WEB", url: "http://secunia.com/advisories/61552", }, { type: "WEB", url: "http://secunia.com/advisories/61565", }, { type: "WEB", url: "http://secunia.com/advisories/61603", }, { type: "WEB", url: "http://secunia.com/advisories/61618", }, { type: "WEB", url: "http://secunia.com/advisories/61622", }, { type: "WEB", url: "http://secunia.com/advisories/61633", }, { type: "WEB", url: "http://secunia.com/advisories/61636", }, { type: "WEB", url: "http://secunia.com/advisories/61641", }, { type: "WEB", url: "http://secunia.com/advisories/61643", }, { type: "WEB", url: "http://secunia.com/advisories/61654", }, { type: "WEB", url: "http://secunia.com/advisories/61703", }, { type: "WEB", url: "http://secunia.com/advisories/61816", }, { type: "WEB", url: "http://secunia.com/advisories/61855", }, { type: "WEB", url: "http://secunia.com/advisories/61857", }, { type: "WEB", url: "http://secunia.com/advisories/61873", }, { type: "WEB", url: "http://secunia.com/advisories/62312", }, { type: "WEB", url: "http://secunia.com/advisories/62343", }, { type: "WEB", url: "http://support.apple.com/HT204244", }, { type: "WEB", url: "http://support.novell.com/security/cve/CVE-2014-7187.html", }, { type: "WEB", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { type: "WEB", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { type: "WEB", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { type: "WEB", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { type: "WEB", url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { type: "WEB", url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { type: "WEB", url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { type: "WEB", url: "http://www.securityfocus.com/archive/1/533593/100/0/threaded", }, { type: "WEB", url: "http://www.ubuntu.com/usn/USN-2364-1", }, { type: "WEB", url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, ], schema_version: "1.4.0", severity: [], }
suse-su-2017:2700-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for SLES 12-SP1 Docker image", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise Server 12 SP1 container image has been updated to include\nsecurity and stability fixes.\n\nThe following issues related to building of the container images have been fixed:\n\n- Included krb5 package to avoid the inclusion of krb5-mini which gets selected as a\n dependency by the Build Service solver. (bsc#1056193)\n- Do not install recommended packages when building container images. (bsc#975726)\n\nA number of security issues that have been already fixed by updates released for\nSUSE Linux Enterprise Server 12 SP1 are now included in the base image. A package/CVE\ncross-reference is available below.\n\npam:\n\n- CVE-2015-3238\n\nlibtasn1:\n\n- CVE-2015-3622\n- CVE-2016-4008\n\nexpat:\n\nexpat:\n\n- CVE-2012-6702\n- CVE-2015-1283\n- CVE-2016-0718\n- CVE-2016-5300\n- CVE-2016-9063\n- CVE-2017-9233\n\nlibidn:\n\n- CVE-2015-2059\n- CVE-2015-8948\n- CVE-2016-6261\n- CVE-2016-6262\n- CVE-2016-6263\n\n\nzlib:\n\n- CVE-2016-9840\n- CVE-2016-9841\n- CVE-2016-9842\n- CVE-2016-9843\n\ncurl:\n\n- CVE-2016-5419\n- CVE-2016-5420\n- CVE-2016-5421\n- CVE-2016-7141\n- CVE-2016-7167\n- CVE-2016-8615\n- CVE-2016-8616\n- CVE-2016-8617\n- CVE-2016-8618\n- CVE-2016-8619\n- CVE-2016-8620\n- CVE-2016-8621\n- CVE-2016-8622\n- CVE-2016-8623\n- CVE-2016-8624\n- CVE-2016-9586\n- CVE-2017-1000100\n- CVE-2017-1000101\n- CVE-2017-7407\n\nopenssl:\n\n- CVE-2016-2105\n- CVE-2016-2106\n- CVE-2016-2107\n- CVE-2016-2108\n- CVE-2016-2109\n- CVE-2016-2177\n- CVE-2016-2178\n- CVE-2016-2179\n- CVE-2016-2180\n- CVE-2016-2181\n- CVE-2016-2182\n- CVE-2016-2183\n- CVE-2016-6302\n- CVE-2016-6303\n- CVE-2016-6304\n- CVE-2016-6306\n- CVE-2016-7056\n- CVE-2016-8610\n- CVE-2017-3731\n\ncracklib:\n\n- CVE-2016-6318\n\npcre:\n\n- CVE-2014-8964\n- CVE-2015-2325\n- CVE-2015-2327\n- CVE-2015-2328\n- CVE-2015-3210\n- CVE-2015-3217\n- CVE-2015-5073\n- CVE-2015-8380\n- CVE-2015-8381\n- CVE-2015-8382\n- CVE-2015-8383\n- CVE-2015-8384\n- CVE-2015-8385\n- CVE-2015-8386\n- CVE-2015-8387\n- CVE-2015-8388\n- CVE-2015-8389\n- CVE-2015-8390\n- CVE-2015-8391\n- CVE-2015-8392\n- CVE-2015-8393\n- CVE-2015-8394\n- CVE-2015-8395\n- CVE-2016-1283\n- CVE-2016-3191\n\nappamor:\n\n- CVE-2017-6507\n\nbash:\n\n- CVE-2014-6277\n- CVE-2014-6278\n- CVE-2016-0634\n- CVE-2016-7543\n\ncpio:\n\n- CVE-2016-2037\n\nglibc:\n\n- CVE-2016-1234\n- CVE-2016-3075\n- CVE-2016-3706\n- CVE-2016-4429\n- CVE-2017-1000366\n\nperl:\n\n- CVE-2015-8853\n- CVE-2016-1238\n- CVE-2016-2381\n- CVE-2016-6185\n\nlibssh2_org:\n\n- CVE-2016-0787\n\nutil-linux:\n\n- CVE-2016-5011\n- CVE-2017-2616\n\nncurses:\n\n- CVE-2017-10684\n- CVE-2017-10685\n- CVE-2017-11112\n- CVE-2017-11113\n\nlibksba:\n\n- CVE-2016-4574\n- CVE-2016-4579\n\nlibxml2:\n\n- CVE-2014-0191\n- CVE-2015-8806\n- CVE-2016-1762\n- CVE-2016-1833\n- CVE-2016-1834\n- CVE-2016-1835\n- CVE-2016-1837\n- CVE-2016-1838\n- CVE-2016-1839\n- CVE-2016-1840\n- CVE-2016-2073\n- CVE-2016-3627\n- CVE-2016-3705\n- CVE-2016-4447\n- CVE-2016-4448\n- CVE-2016-4449\n- CVE-2016-4483\n- CVE-2016-4658\n- CVE-2016-9318\n- CVE-2016-9597\n- CVE-2017-9047\n- CVE-2017-9048\n- CVE-2017-9049\n- CVE-2017-9050\n\nlibgcrypt:\n\n- CVE-2015-7511\n- CVE-2016-6313\n- CVE-2017-7526\n\nupdate-alternatives:\n\n- CVE-2015-0860\n\nsystemd:\n\n- CVE-2014-9770\n- CVE-2015-8842\n- CVE-2016-7796\n\ndbus-1:\n\n- CVE-2014-7824\n- CVE-2015-0245\n\nFinally, the following packages received non-security fixes:\n\n- augeas\n- bzip2\n- ca-certificates-mozilla\n- coreutils\n- cryptsetup\n- cyrus-sasl\n- dirmngr\n- e2fsprogs\n- findutils\n- gpg2\n- insserv-compat\n- kmod\n- libcap\n- libsolv\n- libzypp\n- lua51\n- lvm2\n- netcfg\n- p11-kit\n- permissions\n- procps\n- rpm\n- sed\n- sg3_utils\n- shadow\n- zypper\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Module-Containers-12-2017-1673", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2700-1.json", }, { category: "self", summary: "URL for SUSE-SU-2017:2700-1", url: "https://www.suse.com/support/update/announcement/2017/suse-su-20172700-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2017:2700-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html", }, { category: "self", summary: "SUSE Bug 1056193", url: "https://bugzilla.suse.com/1056193", }, { category: "self", summary: "SUSE Bug 975726", url: "https://bugzilla.suse.com/975726", }, { category: "self", summary: "SUSE CVE CVE-2012-6702 page", url: "https://www.suse.com/security/cve/CVE-2012-6702/", }, { category: "self", summary: "SUSE CVE CVE-2014-0191 page", url: "https://www.suse.com/security/cve/CVE-2014-0191/", }, { category: "self", summary: "SUSE CVE CVE-2014-6271 page", url: "https://www.suse.com/security/cve/CVE-2014-6271/", }, { category: "self", summary: "SUSE CVE CVE-2014-6277 page", url: "https://www.suse.com/security/cve/CVE-2014-6277/", }, { category: "self", summary: "SUSE CVE CVE-2014-6278 page", url: "https://www.suse.com/security/cve/CVE-2014-6278/", }, { category: "self", summary: "SUSE CVE CVE-2014-7169 page", url: "https://www.suse.com/security/cve/CVE-2014-7169/", }, { category: "self", summary: "SUSE CVE CVE-2014-7187 page", url: "https://www.suse.com/security/cve/CVE-2014-7187/", }, { category: "self", summary: "SUSE CVE CVE-2014-7824 page", url: "https://www.suse.com/security/cve/CVE-2014-7824/", }, { category: "self", summary: "SUSE CVE CVE-2014-8964 page", url: "https://www.suse.com/security/cve/CVE-2014-8964/", }, { category: "self", summary: "SUSE CVE CVE-2014-9770 page", url: "https://www.suse.com/security/cve/CVE-2014-9770/", }, { category: "self", summary: "SUSE CVE CVE-2015-0245 page", url: "https://www.suse.com/security/cve/CVE-2015-0245/", }, { category: "self", summary: "SUSE CVE CVE-2015-0860 page", url: "https://www.suse.com/security/cve/CVE-2015-0860/", }, { category: "self", summary: "SUSE CVE CVE-2015-1283 page", url: "https://www.suse.com/security/cve/CVE-2015-1283/", }, { category: "self", summary: "SUSE CVE CVE-2015-2059 page", url: "https://www.suse.com/security/cve/CVE-2015-2059/", }, { category: "self", summary: "SUSE CVE CVE-2015-2325 page", url: "https://www.suse.com/security/cve/CVE-2015-2325/", }, { category: "self", summary: "SUSE CVE CVE-2015-2327 page", url: "https://www.suse.com/security/cve/CVE-2015-2327/", }, { category: "self", summary: "SUSE CVE CVE-2015-2328 page", url: "https://www.suse.com/security/cve/CVE-2015-2328/", }, { category: "self", summary: "SUSE CVE CVE-2015-3210 page", url: "https://www.suse.com/security/cve/CVE-2015-3210/", }, { category: "self", summary: "SUSE CVE CVE-2015-3217 page", url: "https://www.suse.com/security/cve/CVE-2015-3217/", }, { category: "self", summary: "SUSE CVE CVE-2015-3238 page", url: "https://www.suse.com/security/cve/CVE-2015-3238/", }, { category: "self", summary: "SUSE CVE CVE-2015-3622 page", url: "https://www.suse.com/security/cve/CVE-2015-3622/", }, { category: "self", summary: "SUSE CVE CVE-2015-5073 page", url: "https://www.suse.com/security/cve/CVE-2015-5073/", }, { category: "self", summary: "SUSE CVE CVE-2015-5276 page", url: "https://www.suse.com/security/cve/CVE-2015-5276/", }, { category: "self", summary: "SUSE CVE CVE-2015-7511 page", url: "https://www.suse.com/security/cve/CVE-2015-7511/", }, { category: "self", summary: "SUSE CVE CVE-2015-8380 page", url: "https://www.suse.com/security/cve/CVE-2015-8380/", }, { category: "self", summary: "SUSE CVE CVE-2015-8381 page", url: "https://www.suse.com/security/cve/CVE-2015-8381/", }, { category: "self", summary: "SUSE CVE CVE-2015-8382 page", url: "https://www.suse.com/security/cve/CVE-2015-8382/", }, { category: "self", summary: "SUSE CVE CVE-2015-8383 page", url: "https://www.suse.com/security/cve/CVE-2015-8383/", }, { category: "self", summary: "SUSE CVE CVE-2015-8384 page", url: "https://www.suse.com/security/cve/CVE-2015-8384/", }, { category: "self", summary: "SUSE CVE CVE-2015-8385 page", url: "https://www.suse.com/security/cve/CVE-2015-8385/", }, { category: "self", summary: "SUSE CVE CVE-2015-8386 page", url: "https://www.suse.com/security/cve/CVE-2015-8386/", }, { category: "self", summary: "SUSE CVE CVE-2015-8387 page", url: "https://www.suse.com/security/cve/CVE-2015-8387/", }, { category: "self", summary: "SUSE CVE CVE-2015-8388 page", url: "https://www.suse.com/security/cve/CVE-2015-8388/", }, { category: "self", summary: "SUSE CVE CVE-2015-8389 page", url: "https://www.suse.com/security/cve/CVE-2015-8389/", }, { category: "self", summary: "SUSE CVE CVE-2015-8390 page", url: "https://www.suse.com/security/cve/CVE-2015-8390/", }, { category: "self", summary: "SUSE CVE CVE-2015-8391 page", url: "https://www.suse.com/security/cve/CVE-2015-8391/", }, { category: "self", summary: "SUSE CVE CVE-2015-8392 page", url: "https://www.suse.com/security/cve/CVE-2015-8392/", }, { category: "self", summary: "SUSE CVE CVE-2015-8393 page", url: "https://www.suse.com/security/cve/CVE-2015-8393/", }, { category: "self", summary: "SUSE CVE CVE-2015-8394 page", url: "https://www.suse.com/security/cve/CVE-2015-8394/", }, { category: "self", summary: "SUSE CVE CVE-2015-8395 page", url: "https://www.suse.com/security/cve/CVE-2015-8395/", }, { category: "self", summary: "SUSE CVE CVE-2015-8806 page", url: "https://www.suse.com/security/cve/CVE-2015-8806/", }, { category: "self", summary: "SUSE CVE CVE-2015-8842 page", url: "https://www.suse.com/security/cve/CVE-2015-8842/", }, { category: "self", summary: "SUSE CVE CVE-2015-8853 page", url: "https://www.suse.com/security/cve/CVE-2015-8853/", }, { category: "self", summary: "SUSE CVE CVE-2015-8948 page", url: "https://www.suse.com/security/cve/CVE-2015-8948/", }, { category: "self", summary: "SUSE CVE CVE-2016-0634 page", url: "https://www.suse.com/security/cve/CVE-2016-0634/", }, { category: "self", summary: "SUSE CVE CVE-2016-0718 page", url: "https://www.suse.com/security/cve/CVE-2016-0718/", }, { category: "self", summary: "SUSE CVE CVE-2016-0787 page", url: "https://www.suse.com/security/cve/CVE-2016-0787/", }, { category: "self", summary: "SUSE CVE CVE-2016-1234 page", url: "https://www.suse.com/security/cve/CVE-2016-1234/", }, { category: "self", summary: "SUSE CVE CVE-2016-1238 page", url: "https://www.suse.com/security/cve/CVE-2016-1238/", }, { category: "self", summary: "SUSE CVE CVE-2016-1283 page", url: "https://www.suse.com/security/cve/CVE-2016-1283/", }, { category: "self", summary: "SUSE CVE CVE-2016-1762 page", url: "https://www.suse.com/security/cve/CVE-2016-1762/", }, { category: "self", summary: "SUSE CVE CVE-2016-1833 page", url: "https://www.suse.com/security/cve/CVE-2016-1833/", }, { category: "self", summary: "SUSE CVE CVE-2016-1834 page", url: "https://www.suse.com/security/cve/CVE-2016-1834/", }, { category: "self", summary: "SUSE CVE CVE-2016-1835 page", url: "https://www.suse.com/security/cve/CVE-2016-1835/", }, { category: "self", summary: "SUSE CVE CVE-2016-1837 page", url: "https://www.suse.com/security/cve/CVE-2016-1837/", }, { category: "self", summary: "SUSE CVE CVE-2016-1838 page", url: "https://www.suse.com/security/cve/CVE-2016-1838/", }, { category: "self", summary: "SUSE CVE CVE-2016-1839 page", url: "https://www.suse.com/security/cve/CVE-2016-1839/", }, { category: "self", summary: "SUSE CVE CVE-2016-1840 page", url: "https://www.suse.com/security/cve/CVE-2016-1840/", }, { category: "self", summary: "SUSE CVE CVE-2016-2037 page", url: "https://www.suse.com/security/cve/CVE-2016-2037/", }, { category: "self", summary: "SUSE CVE CVE-2016-2073 page", url: "https://www.suse.com/security/cve/CVE-2016-2073/", }, { category: "self", summary: "SUSE CVE CVE-2016-2105 page", url: "https://www.suse.com/security/cve/CVE-2016-2105/", }, { category: "self", summary: "SUSE CVE CVE-2016-2106 page", url: "https://www.suse.com/security/cve/CVE-2016-2106/", }, { category: "self", summary: "SUSE CVE CVE-2016-2107 page", url: "https://www.suse.com/security/cve/CVE-2016-2107/", }, { category: "self", summary: "SUSE CVE CVE-2016-2108 page", url: "https://www.suse.com/security/cve/CVE-2016-2108/", }, { category: "self", summary: "SUSE CVE CVE-2016-2109 page", url: "https://www.suse.com/security/cve/CVE-2016-2109/", }, { category: "self", summary: "SUSE CVE CVE-2016-2177 page", url: "https://www.suse.com/security/cve/CVE-2016-2177/", }, { category: "self", summary: "SUSE CVE CVE-2016-2178 page", url: "https://www.suse.com/security/cve/CVE-2016-2178/", }, { category: "self", summary: "SUSE CVE CVE-2016-2179 page", url: "https://www.suse.com/security/cve/CVE-2016-2179/", }, { category: "self", summary: "SUSE CVE CVE-2016-2180 page", url: "https://www.suse.com/security/cve/CVE-2016-2180/", }, { category: "self", summary: "SUSE CVE CVE-2016-2181 page", url: "https://www.suse.com/security/cve/CVE-2016-2181/", }, { category: "self", summary: "SUSE CVE CVE-2016-2182 page", url: "https://www.suse.com/security/cve/CVE-2016-2182/", }, { category: "self", summary: "SUSE CVE CVE-2016-2183 page", url: "https://www.suse.com/security/cve/CVE-2016-2183/", }, { category: "self", summary: "SUSE CVE CVE-2016-2381 page", url: "https://www.suse.com/security/cve/CVE-2016-2381/", }, { category: "self", summary: "SUSE CVE CVE-2016-3075 page", url: "https://www.suse.com/security/cve/CVE-2016-3075/", }, { category: "self", summary: "SUSE CVE CVE-2016-3191 page", url: "https://www.suse.com/security/cve/CVE-2016-3191/", }, { category: "self", summary: "SUSE CVE CVE-2016-3627 page", url: "https://www.suse.com/security/cve/CVE-2016-3627/", }, { category: "self", summary: "SUSE CVE CVE-2016-3705 page", url: "https://www.suse.com/security/cve/CVE-2016-3705/", }, { category: "self", summary: "SUSE CVE CVE-2016-3706 page", url: "https://www.suse.com/security/cve/CVE-2016-3706/", }, { category: "self", summary: "SUSE CVE CVE-2016-4008 page", url: "https://www.suse.com/security/cve/CVE-2016-4008/", }, { category: "self", summary: "SUSE CVE CVE-2016-4429 page", url: "https://www.suse.com/security/cve/CVE-2016-4429/", }, { category: "self", summary: "SUSE CVE CVE-2016-4447 page", url: "https://www.suse.com/security/cve/CVE-2016-4447/", }, { category: "self", summary: "SUSE CVE CVE-2016-4448 page", url: "https://www.suse.com/security/cve/CVE-2016-4448/", }, { category: "self", summary: "SUSE CVE CVE-2016-4449 page", url: "https://www.suse.com/security/cve/CVE-2016-4449/", }, { category: "self", summary: "SUSE CVE CVE-2016-4483 page", url: "https://www.suse.com/security/cve/CVE-2016-4483/", }, { category: "self", summary: "SUSE CVE CVE-2016-4574 page", url: "https://www.suse.com/security/cve/CVE-2016-4574/", }, { category: "self", summary: "SUSE CVE CVE-2016-4579 page", url: "https://www.suse.com/security/cve/CVE-2016-4579/", }, { category: "self", summary: "SUSE CVE CVE-2016-4658 page", url: "https://www.suse.com/security/cve/CVE-2016-4658/", }, { category: "self", summary: "SUSE CVE CVE-2016-5011 page", url: "https://www.suse.com/security/cve/CVE-2016-5011/", }, { category: "self", summary: "SUSE CVE CVE-2016-5300 page", url: "https://www.suse.com/security/cve/CVE-2016-5300/", }, { category: "self", summary: "SUSE CVE CVE-2016-5419 page", url: "https://www.suse.com/security/cve/CVE-2016-5419/", }, { category: "self", summary: "SUSE CVE CVE-2016-5420 page", url: "https://www.suse.com/security/cve/CVE-2016-5420/", }, { category: "self", summary: "SUSE CVE CVE-2016-5421 page", url: "https://www.suse.com/security/cve/CVE-2016-5421/", }, { category: "self", summary: "SUSE CVE CVE-2016-6185 page", url: "https://www.suse.com/security/cve/CVE-2016-6185/", }, { category: "self", summary: "SUSE CVE CVE-2016-6261 page", url: "https://www.suse.com/security/cve/CVE-2016-6261/", }, { category: "self", summary: "SUSE CVE CVE-2016-6262 page", url: "https://www.suse.com/security/cve/CVE-2016-6262/", }, { category: "self", summary: "SUSE CVE CVE-2016-6263 page", url: "https://www.suse.com/security/cve/CVE-2016-6263/", }, { category: "self", summary: "SUSE CVE CVE-2016-6302 page", url: "https://www.suse.com/security/cve/CVE-2016-6302/", }, { category: "self", summary: "SUSE CVE CVE-2016-6303 page", url: "https://www.suse.com/security/cve/CVE-2016-6303/", }, { category: "self", summary: "SUSE CVE CVE-2016-6304 page", url: "https://www.suse.com/security/cve/CVE-2016-6304/", }, { category: "self", summary: "SUSE CVE CVE-2016-6306 page", url: "https://www.suse.com/security/cve/CVE-2016-6306/", }, { category: "self", summary: "SUSE CVE CVE-2016-6313 page", url: "https://www.suse.com/security/cve/CVE-2016-6313/", }, { category: "self", summary: "SUSE CVE CVE-2016-6318 page", url: "https://www.suse.com/security/cve/CVE-2016-6318/", }, { category: "self", summary: "SUSE CVE CVE-2016-7056 page", url: "https://www.suse.com/security/cve/CVE-2016-7056/", }, { category: "self", summary: "SUSE CVE CVE-2016-7141 page", url: "https://www.suse.com/security/cve/CVE-2016-7141/", }, { category: "self", summary: "SUSE CVE CVE-2016-7167 page", url: "https://www.suse.com/security/cve/CVE-2016-7167/", }, { category: "self", summary: "SUSE CVE CVE-2016-7543 page", url: "https://www.suse.com/security/cve/CVE-2016-7543/", }, { category: "self", summary: "SUSE CVE CVE-2016-7796 page", url: "https://www.suse.com/security/cve/CVE-2016-7796/", }, { category: "self", summary: "SUSE CVE CVE-2016-8610 page", url: "https://www.suse.com/security/cve/CVE-2016-8610/", }, { category: "self", summary: "SUSE CVE CVE-2016-8615 page", url: "https://www.suse.com/security/cve/CVE-2016-8615/", }, { category: "self", summary: "SUSE CVE CVE-2016-8616 page", url: "https://www.suse.com/security/cve/CVE-2016-8616/", }, { category: "self", summary: "SUSE CVE CVE-2016-8617 page", url: "https://www.suse.com/security/cve/CVE-2016-8617/", }, { category: "self", summary: "SUSE CVE CVE-2016-8618 page", url: "https://www.suse.com/security/cve/CVE-2016-8618/", }, { category: "self", summary: "SUSE CVE CVE-2016-8619 page", url: "https://www.suse.com/security/cve/CVE-2016-8619/", }, { category: "self", summary: "SUSE CVE CVE-2016-8620 page", url: "https://www.suse.com/security/cve/CVE-2016-8620/", }, { category: "self", summary: "SUSE CVE CVE-2016-8621 page", url: "https://www.suse.com/security/cve/CVE-2016-8621/", }, { category: "self", summary: "SUSE CVE CVE-2016-8622 page", url: "https://www.suse.com/security/cve/CVE-2016-8622/", }, { category: "self", summary: "SUSE CVE CVE-2016-8623 page", url: "https://www.suse.com/security/cve/CVE-2016-8623/", }, { category: "self", summary: "SUSE CVE CVE-2016-8624 page", url: "https://www.suse.com/security/cve/CVE-2016-8624/", }, { category: "self", summary: "SUSE CVE CVE-2016-9063 page", url: "https://www.suse.com/security/cve/CVE-2016-9063/", }, { category: "self", summary: "SUSE CVE CVE-2016-9318 page", url: "https://www.suse.com/security/cve/CVE-2016-9318/", }, { category: "self", summary: "SUSE CVE CVE-2016-9586 page", url: "https://www.suse.com/security/cve/CVE-2016-9586/", }, { category: "self", summary: "SUSE CVE CVE-2016-9597 page", url: "https://www.suse.com/security/cve/CVE-2016-9597/", }, { category: "self", summary: "SUSE CVE CVE-2016-9840 page", url: "https://www.suse.com/security/cve/CVE-2016-9840/", }, { category: "self", summary: "SUSE CVE CVE-2016-9841 page", url: "https://www.suse.com/security/cve/CVE-2016-9841/", }, { category: "self", summary: "SUSE CVE CVE-2016-9842 page", url: "https://www.suse.com/security/cve/CVE-2016-9842/", }, { category: "self", summary: "SUSE CVE CVE-2016-9843 page", url: "https://www.suse.com/security/cve/CVE-2016-9843/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000100 page", url: "https://www.suse.com/security/cve/CVE-2017-1000100/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000101 page", url: "https://www.suse.com/security/cve/CVE-2017-1000101/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000366 page", url: "https://www.suse.com/security/cve/CVE-2017-1000366/", }, { category: "self", summary: "SUSE CVE CVE-2017-10684 page", url: "https://www.suse.com/security/cve/CVE-2017-10684/", }, { category: "self", summary: "SUSE CVE CVE-2017-10685 page", url: "https://www.suse.com/security/cve/CVE-2017-10685/", }, { category: "self", summary: "SUSE CVE CVE-2017-11112 page", url: "https://www.suse.com/security/cve/CVE-2017-11112/", }, { category: "self", summary: "SUSE CVE CVE-2017-11113 page", url: "https://www.suse.com/security/cve/CVE-2017-11113/", }, { category: "self", summary: "SUSE CVE CVE-2017-2616 page", url: "https://www.suse.com/security/cve/CVE-2017-2616/", }, { category: "self", summary: "SUSE CVE CVE-2017-3731 page", url: "https://www.suse.com/security/cve/CVE-2017-3731/", }, { category: "self", summary: "SUSE CVE CVE-2017-6507 page", url: "https://www.suse.com/security/cve/CVE-2017-6507/", }, { category: "self", summary: "SUSE CVE CVE-2017-7407 page", url: "https://www.suse.com/security/cve/CVE-2017-7407/", }, { category: "self", summary: "SUSE CVE CVE-2017-7526 page", url: "https://www.suse.com/security/cve/CVE-2017-7526/", }, { category: "self", summary: "SUSE CVE CVE-2017-9047 page", url: "https://www.suse.com/security/cve/CVE-2017-9047/", }, { category: "self", summary: "SUSE CVE CVE-2017-9048 page", url: "https://www.suse.com/security/cve/CVE-2017-9048/", }, { category: "self", summary: "SUSE CVE CVE-2017-9049 page", url: "https://www.suse.com/security/cve/CVE-2017-9049/", }, { category: "self", summary: "SUSE CVE CVE-2017-9050 page", url: "https://www.suse.com/security/cve/CVE-2017-9050/", }, { category: "self", summary: "SUSE CVE CVE-2017-9233 page", url: "https://www.suse.com/security/cve/CVE-2017-9233/", }, ], title: "Security update for SLES 12-SP1 Docker image", tracking: { current_release_date: "2017-10-10T19:37:36Z", generator: { date: "2017-10-10T19:37:36Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2017:2700-1", initial_release_date: "2017-10-10T19:37:36Z", revision_history: [ { date: "2017-10-10T19:37:36Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "sles12sp1-docker-image-1.0.7-20171002.ppc64le", product: { name: "sles12sp1-docker-image-1.0.7-20171002.ppc64le", product_id: "sles12sp1-docker-image-1.0.7-20171002.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "sles12sp1-docker-image-1.0.7-20171002.s390x", product: { name: "sles12sp1-docker-image-1.0.7-20171002.s390x", product_id: "sles12sp1-docker-image-1.0.7-20171002.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "sles12sp1-docker-image-1.0.7-20171002.x86_64", product: { name: "sles12sp1-docker-image-1.0.7-20171002.x86_64", product_id: "sles12sp1-docker-image-1.0.7-20171002.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Containers 12", product: { name: "SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-containers:12", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "sles12sp1-docker-image-1.0.7-20171002.ppc64le as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", }, product_reference: "sles12sp1-docker-image-1.0.7-20171002.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "sles12sp1-docker-image-1.0.7-20171002.s390x as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", }, product_reference: "sles12sp1-docker-image-1.0.7-20171002.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "sles12sp1-docker-image-1.0.7-20171002.x86_64 as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", }, product_reference: "sles12sp1-docker-image-1.0.7-20171002.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, ], }, vulnerabilities: [ { cve: "CVE-2012-6702", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-6702", }, ], notes: [ { category: "general", text: "Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-6702", url: "https://www.suse.com/security/cve/CVE-2012-6702", }, { category: "external", summary: "SUSE Bug 983215 for CVE-2012-6702", url: "https://bugzilla.suse.com/983215", }, { category: "external", summary: "SUSE Bug 983216 for CVE-2012-6702", url: "https://bugzilla.suse.com/983216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2012-6702", }, { cve: "CVE-2014-0191", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-0191", }, ], notes: [ { category: "general", text: "The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-0191", url: "https://www.suse.com/security/cve/CVE-2014-0191", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2014-0191", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2014-0191", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 876652 for CVE-2014-0191", url: "https://bugzilla.suse.com/876652", }, { category: "external", summary: "SUSE Bug 877506 for CVE-2014-0191", url: "https://bugzilla.suse.com/877506", }, { category: "external", summary: "SUSE Bug 996079 for CVE-2014-0191", url: "https://bugzilla.suse.com/996079", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2014-0191", }, { cve: "CVE-2014-6271", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6271", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6271", url: "https://www.suse.com/security/cve/CVE-2014-6271", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-6271", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 1130324 for CVE-2014-6271", url: "https://bugzilla.suse.com/1130324", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2014-6271", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 896776 for CVE-2014-6271", url: "https://bugzilla.suse.com/896776", }, { category: "external", summary: "SUSE Bug 898346 for CVE-2014-6271", url: "https://bugzilla.suse.com/898346", }, { category: "external", summary: "SUSE Bug 898604 for CVE-2014-6271", url: "https://bugzilla.suse.com/898604", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6271", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6271", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6271", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-6271", url: "https://bugzilla.suse.com/900454", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2014-6271", }, { cve: "CVE-2014-6277", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6277", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6277", url: "https://www.suse.com/security/cve/CVE-2014-6277", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6277", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6277", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6277", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-6277", url: "https://bugzilla.suse.com/900454", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2014-6277", }, { cve: "CVE-2014-6278", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6278", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6278", url: "https://www.suse.com/security/cve/CVE-2014-6278", }, { category: "external", summary: "SUSE Bug 898604 for CVE-2014-6278", url: "https://bugzilla.suse.com/898604", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6278", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6278", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6278", url: "https://bugzilla.suse.com/900127", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2014-6278", }, { cve: "CVE-2014-7169", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7169", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7169", url: "https://www.suse.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-7169", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 1130324 for CVE-2014-7169", url: "https://bugzilla.suse.com/1130324", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2014-7169", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 896776 for CVE-2014-7169", url: "https://bugzilla.suse.com/896776", }, { category: "external", summary: "SUSE Bug 898346 for CVE-2014-7169", url: "https://bugzilla.suse.com/898346", }, { category: "external", summary: "SUSE Bug 898762 for CVE-2014-7169", url: "https://bugzilla.suse.com/898762", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-7169", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-7169", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 899039 for CVE-2014-7169", url: "https://bugzilla.suse.com/899039", }, { category: "external", summary: "SUSE Bug 899266 for CVE-2014-7169", url: "https://bugzilla.suse.com/899266", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-7169", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-7169", url: "https://bugzilla.suse.com/900454", }, { category: "external", summary: "SUSE Bug 902237 for CVE-2014-7169", url: "https://bugzilla.suse.com/902237", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2014-7169", }, { cve: "CVE-2014-7187", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7187", }, ], notes: [ { category: "general", text: "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7187", url: "https://www.suse.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-7187", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 898603 for CVE-2014-7187", url: "https://bugzilla.suse.com/898603", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-7187", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-7187", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 899039 for CVE-2014-7187", url: "https://bugzilla.suse.com/899039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2014-7187", }, { cve: "CVE-2014-7824", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7824", }, ], notes: [ { category: "general", text: "D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7824", url: "https://www.suse.com/security/cve/CVE-2014-7824", }, { category: "external", summary: "SUSE Bug 904017 for CVE-2014-7824", url: "https://bugzilla.suse.com/904017", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2014-7824", }, { cve: "CVE-2014-8964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-8964", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-8964", url: "https://www.suse.com/security/cve/CVE-2014-8964", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2014-8964", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 924960 for CVE-2014-8964", url: "https://bugzilla.suse.com/924960", }, { category: "external", summary: "SUSE Bug 933288 for CVE-2014-8964", url: "https://bugzilla.suse.com/933288", }, { category: "external", summary: "SUSE Bug 936408 for CVE-2014-8964", url: "https://bugzilla.suse.com/936408", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2014-8964", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2014-8964", }, { cve: "CVE-2014-9770", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9770", }, ], notes: [ { category: "general", text: "tmpfiles.d/systemd.conf in systemd before 214 uses weak permissions for journal files under (1) /run/log/journal/%m and (2) /var/log/journal/%m, which allows local users to obtain sensitive information by reading these files.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9770", url: "https://www.suse.com/security/cve/CVE-2014-9770", }, { category: "external", summary: "SUSE Bug 972612 for CVE-2014-9770", url: "https://bugzilla.suse.com/972612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2014-9770", }, { cve: "CVE-2015-0245", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0245", }, ], notes: [ { category: "general", text: "D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0245", url: "https://www.suse.com/security/cve/CVE-2015-0245", }, { category: "external", summary: "SUSE Bug 1003898 for CVE-2015-0245", url: "https://bugzilla.suse.com/1003898", }, { category: "external", summary: "SUSE Bug 916343 for CVE-2015-0245", url: "https://bugzilla.suse.com/916343", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2015-0245", }, { cve: "CVE-2015-0860", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0860", }, ], notes: [ { category: "general", text: "Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an \"old-style\" Debian binary package, which triggers a stack-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0860", url: "https://www.suse.com/security/cve/CVE-2015-0860", }, { category: "external", summary: "SUSE Bug 957160 for CVE-2015-0860", url: "https://bugzilla.suse.com/957160", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-0860", }, { cve: "CVE-2015-1283", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-1283", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-1283", url: "https://www.suse.com/security/cve/CVE-2015-1283", }, { category: "external", summary: "SUSE Bug 1034050 for CVE-2015-1283", url: "https://bugzilla.suse.com/1034050", }, { category: "external", summary: "SUSE Bug 939077 for CVE-2015-1283", url: "https://bugzilla.suse.com/939077", }, { category: "external", summary: "SUSE Bug 979441 for CVE-2015-1283", url: "https://bugzilla.suse.com/979441", }, { category: "external", summary: "SUSE Bug 980391 for CVE-2015-1283", url: "https://bugzilla.suse.com/980391", }, { category: "external", summary: "SUSE Bug 983985 for CVE-2015-1283", url: "https://bugzilla.suse.com/983985", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-1283", }, { cve: "CVE-2015-2059", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2059", }, ], notes: [ { category: "general", text: "The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2059", url: "https://www.suse.com/security/cve/CVE-2015-2059", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2015-2059", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 919214 for CVE-2015-2059", url: "https://bugzilla.suse.com/919214", }, { category: "external", summary: "SUSE Bug 923241 for CVE-2015-2059", url: "https://bugzilla.suse.com/923241", }, { category: "external", summary: "SUSE Bug 937096 for CVE-2015-2059", url: "https://bugzilla.suse.com/937096", }, { category: "external", summary: "SUSE Bug 937097 for CVE-2015-2059", url: "https://bugzilla.suse.com/937097", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2015-2059", }, { cve: "CVE-2015-2325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2325", }, ], notes: [ { category: "general", text: "The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2325", url: "https://www.suse.com/security/cve/CVE-2015-2325", }, { category: "external", summary: "SUSE Bug 924960 for CVE-2015-2325", url: "https://bugzilla.suse.com/924960", }, { category: "external", summary: "SUSE Bug 933288 for CVE-2015-2325", url: "https://bugzilla.suse.com/933288", }, { category: "external", summary: "SUSE Bug 936408 for CVE-2015-2325", url: "https://bugzilla.suse.com/936408", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-2325", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-2325", }, { cve: "CVE-2015-2327", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2327", }, ], notes: [ { category: "general", text: "PCRE before 8.36 mishandles the /(((a\\2)|(a*)\\g<-1>))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2327", url: "https://www.suse.com/security/cve/CVE-2015-2327", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-2327", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957567 for CVE-2015-2327", url: "https://bugzilla.suse.com/957567", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-2327", }, { cve: "CVE-2015-2328", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2328", }, ], notes: [ { category: "general", text: "PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2328", url: "https://www.suse.com/security/cve/CVE-2015-2328", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-2328", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957600 for CVE-2015-2328", url: "https://bugzilla.suse.com/957600", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-2328", }, { cve: "CVE-2015-3210", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3210", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3210", url: "https://www.suse.com/security/cve/CVE-2015-3210", }, { category: "external", summary: "SUSE Bug 933288 for CVE-2015-3210", url: "https://bugzilla.suse.com/933288", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-3210", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-3210", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2015-3210", }, { cve: "CVE-2015-3217", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3217", }, ], notes: [ { category: "general", text: "PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\\\.|([^\\\\\\\\W_])?)+)+$/.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3217", url: "https://www.suse.com/security/cve/CVE-2015-3217", }, { category: "external", summary: "SUSE Bug 933878 for CVE-2015-3217", url: "https://bugzilla.suse.com/933878", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-3217", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-3217", }, { cve: "CVE-2015-3238", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3238", }, ], notes: [ { category: "general", text: "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3238", url: "https://www.suse.com/security/cve/CVE-2015-3238", }, { category: "external", summary: "SUSE Bug 1123794 for CVE-2015-3238", url: "https://bugzilla.suse.com/1123794", }, { category: "external", summary: "SUSE Bug 934920 for CVE-2015-3238", url: "https://bugzilla.suse.com/934920", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-3238", }, { cve: "CVE-2015-3622", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3622", }, ], notes: [ { category: "general", text: "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3622", url: "https://www.suse.com/security/cve/CVE-2015-3622", }, { category: "external", summary: "SUSE Bug 929414 for CVE-2015-3622", url: "https://bugzilla.suse.com/929414", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2015-3622", }, { cve: "CVE-2015-5073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-5073", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-5073", url: "https://www.suse.com/security/cve/CVE-2015-5073", }, { category: "external", summary: "SUSE Bug 936227 for CVE-2015-5073", url: "https://bugzilla.suse.com/936227", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-5073", }, { cve: "CVE-2015-5276", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-5276", }, ], notes: [ { category: "general", text: "The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-5276", url: "https://www.suse.com/security/cve/CVE-2015-5276", }, { category: "external", summary: "SUSE Bug 945842 for CVE-2015-5276", url: "https://bugzilla.suse.com/945842", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-5276", }, { cve: "CVE-2015-7511", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-7511", }, ], notes: [ { category: "general", text: "Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-7511", url: "https://www.suse.com/security/cve/CVE-2015-7511", }, { category: "external", summary: "SUSE Bug 965902 for CVE-2015-7511", url: "https://bugzilla.suse.com/965902", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-7511", }, { cve: "CVE-2015-8380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8380", }, ], notes: [ { category: "general", text: "The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \\01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8380", url: "https://www.suse.com/security/cve/CVE-2015-8380", }, { category: "external", summary: "SUSE Bug 957566 for CVE-2015-8380", url: "https://bugzilla.suse.com/957566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2015-8380", }, { cve: "CVE-2015-8381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8381", }, ], notes: [ { category: "general", text: "The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?'R')(\\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and /(?J:(?|(:(?|(?'R')(\\z(?|(?'R')(\\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8381", url: "https://www.suse.com/security/cve/CVE-2015-8381", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8381", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8381", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8381", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-8381", }, { cve: "CVE-2015-8382", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8382", }, ], notes: [ { category: "general", text: "The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8382", url: "https://www.suse.com/security/cve/CVE-2015-8382", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8382", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8382", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8382", }, { cve: "CVE-2015-8383", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8383", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8383", url: "https://www.suse.com/security/cve/CVE-2015-8383", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8383", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8383", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8383", }, { cve: "CVE-2015-8384", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8384", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8384", url: "https://www.suse.com/security/cve/CVE-2015-8384", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8384", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8384", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8384", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8384", }, { cve: "CVE-2015-8385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8385", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?|(\\k'Pm')|(?'Pm'))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8385", url: "https://www.suse.com/security/cve/CVE-2015-8385", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8385", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8385", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8385", }, { cve: "CVE-2015-8386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8386", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8386", url: "https://www.suse.com/security/cve/CVE-2015-8386", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8386", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8386", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8386", }, { cve: "CVE-2015-8387", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8387", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8387", url: "https://www.suse.com/security/cve/CVE-2015-8387", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8387", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8387", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8387", }, { cve: "CVE-2015-8388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8388", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8388", url: "https://www.suse.com/security/cve/CVE-2015-8388", }, { category: "external", summary: "SUSE Bug 936227 for CVE-2015-8388", url: "https://bugzilla.suse.com/936227", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8388", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8388", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8388", }, { cve: "CVE-2015-8389", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8389", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8389", url: "https://www.suse.com/security/cve/CVE-2015-8389", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8389", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8389", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8389", }, { cve: "CVE-2015-8390", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8390", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the [: and \\\\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8390", url: "https://www.suse.com/security/cve/CVE-2015-8390", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8390", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8390", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8390", }, { cve: "CVE-2015-8391", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8391", }, ], notes: [ { category: "general", text: "The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8391", url: "https://www.suse.com/security/cve/CVE-2015-8391", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8391", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8391", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8391", }, { cve: "CVE-2015-8392", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8392", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles certain instances of the (?| substring, which allows remote attackers to cause a denial of service (unintended recursion and buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8395.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8392", url: "https://www.suse.com/security/cve/CVE-2015-8392", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8392", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8392", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8392", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-8392", }, { cve: "CVE-2015-8393", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8393", }, ], notes: [ { category: "general", text: "pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8393", url: "https://www.suse.com/security/cve/CVE-2015-8393", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8393", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8393", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8393", }, { cve: "CVE-2015-8394", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8394", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the (?(<digits>) and (?(R<digits>) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8394", url: "https://www.suse.com/security/cve/CVE-2015-8394", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8394", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8394", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8394", }, { cve: "CVE-2015-8395", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8395", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles certain references, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8392.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8395", url: "https://www.suse.com/security/cve/CVE-2015-8395", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8395", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8395", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8395", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2015-8395", }, { cve: "CVE-2015-8806", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8806", }, ], notes: [ { category: "general", text: "dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the \"<!DOCTYPE html\" substring in a crafted HTML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8806", url: "https://www.suse.com/security/cve/CVE-2015-8806", }, { category: "external", summary: "SUSE Bug 963963 for CVE-2015-8806", url: "https://bugzilla.suse.com/963963", }, { category: "external", summary: "SUSE Bug 965283 for CVE-2015-8806", url: "https://bugzilla.suse.com/965283", }, { category: "external", summary: "SUSE Bug 981114 for CVE-2015-8806", url: "https://bugzilla.suse.com/981114", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-8806", }, { cve: "CVE-2015-8842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8842", }, ], notes: [ { category: "general", text: "tmpfiles.d/systemd.conf in systemd before 229 uses weak permissions for /var/log/journal/%m/system.journal, which allows local users to obtain sensitive information by reading the file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8842", url: "https://www.suse.com/security/cve/CVE-2015-8842", }, { category: "external", summary: "SUSE Bug 972612 for CVE-2015-8842", url: "https://bugzilla.suse.com/972612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-8842", }, { cve: "CVE-2015-8853", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8853", }, ], notes: [ { category: "general", text: "The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by \"a\\x80.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8853", url: "https://www.suse.com/security/cve/CVE-2015-8853", }, { category: "external", summary: "SUSE Bug 976584 for CVE-2015-8853", url: "https://bugzilla.suse.com/976584", }, { category: "external", summary: "SUSE Bug 997948 for CVE-2015-8853", url: "https://bugzilla.suse.com/997948", }, { category: "external", summary: "SUSE Bug 997950 for CVE-2015-8853", url: "https://bugzilla.suse.com/997950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-8853", }, { cve: "CVE-2015-8948", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8948", }, ], notes: [ { category: "general", text: "idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8948", url: "https://www.suse.com/security/cve/CVE-2015-8948", }, { category: "external", summary: "SUSE Bug 1014473 for CVE-2015-8948", url: "https://bugzilla.suse.com/1014473", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2015-8948", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 1190777 for CVE-2015-8948", url: "https://bugzilla.suse.com/1190777", }, { category: "external", summary: "SUSE Bug 990189 for CVE-2015-8948", url: "https://bugzilla.suse.com/990189", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2015-8948", }, { cve: "CVE-2016-0634", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0634", }, ], notes: [ { category: "general", text: "The expansion of '\\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0634", url: "https://www.suse.com/security/cve/CVE-2016-0634", }, { category: "external", summary: "SUSE Bug 1000396 for CVE-2016-0634", url: "https://bugzilla.suse.com/1000396", }, { category: "external", summary: "SUSE Bug 1001299 for CVE-2016-0634", url: "https://bugzilla.suse.com/1001299", }, { category: "external", summary: "SUSE Bug 1159416 for CVE-2016-0634", url: "https://bugzilla.suse.com/1159416", }, { category: "external", summary: "SUSE Bug 1188388 for CVE-2016-0634", url: "https://bugzilla.suse.com/1188388", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-0634", }, { cve: "CVE-2016-0718", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0718", }, ], notes: [ { category: "general", text: "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0718", url: "https://www.suse.com/security/cve/CVE-2016-0718", }, { category: "external", summary: "SUSE Bug 979441 for CVE-2016-0718", url: "https://bugzilla.suse.com/979441", }, { category: "external", summary: "SUSE Bug 991809 for CVE-2016-0718", url: "https://bugzilla.suse.com/991809", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-0718", }, { cve: "CVE-2016-0787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0787", }, ], notes: [ { category: "general", text: "The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a \"bits/bytes confusion bug.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0787", url: "https://www.suse.com/security/cve/CVE-2016-0787", }, { category: "external", summary: "SUSE Bug 1149968 for CVE-2016-0787", url: "https://bugzilla.suse.com/1149968", }, { category: "external", summary: "SUSE Bug 967026 for CVE-2016-0787", url: "https://bugzilla.suse.com/967026", }, { category: "external", summary: "SUSE Bug 968174 for CVE-2016-0787", url: "https://bugzilla.suse.com/968174", }, { category: "external", summary: "SUSE Bug 974691 for CVE-2016-0787", url: "https://bugzilla.suse.com/974691", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-0787", }, { cve: "CVE-2016-1234", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1234", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1234", url: "https://www.suse.com/security/cve/CVE-2016-1234", }, { category: "external", summary: "SUSE Bug 1020940 for CVE-2016-1234", url: "https://bugzilla.suse.com/1020940", }, { category: "external", summary: "SUSE Bug 969727 for CVE-2016-1234", url: "https://bugzilla.suse.com/969727", }, { category: "external", summary: "SUSE Bug 988770 for CVE-2016-1234", url: "https://bugzilla.suse.com/988770", }, { category: "external", summary: "SUSE Bug 988782 for CVE-2016-1234", url: "https://bugzilla.suse.com/988782", }, { category: "external", summary: "SUSE Bug 989127 for CVE-2016-1234", url: "https://bugzilla.suse.com/989127", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-1234", }, { cve: "CVE-2016-1238", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1238", }, ], notes: [ { category: "general", text: "(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1238", url: "https://www.suse.com/security/cve/CVE-2016-1238", }, { category: "external", summary: "SUSE Bug 1108749 for CVE-2016-1238", url: "https://bugzilla.suse.com/1108749", }, { category: "external", summary: "SUSE Bug 1123389 for CVE-2016-1238", url: "https://bugzilla.suse.com/1123389", }, { category: "external", summary: "SUSE Bug 987887 for CVE-2016-1238", url: "https://bugzilla.suse.com/987887", }, { category: "external", summary: "SUSE Bug 988311 for CVE-2016-1238", url: "https://bugzilla.suse.com/988311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-1238", }, { cve: "CVE-2016-1283", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1283", }, ], notes: [ { category: "general", text: "The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\\\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\\){97)?J)?J)(?'R'(?'R'\\){99|(:(?|(?'R')(\\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1283", url: "https://www.suse.com/security/cve/CVE-2016-1283", }, { category: "external", summary: "SUSE Bug 960837 for CVE-2016-1283", url: "https://bugzilla.suse.com/960837", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2016-1283", }, { cve: "CVE-2016-1762", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1762", }, ], notes: [ { category: "general", text: "The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1762", url: "https://www.suse.com/security/cve/CVE-2016-1762", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1762", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981040 for CVE-2016-1762", url: "https://bugzilla.suse.com/981040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-1762", }, { cve: "CVE-2016-1833", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1833", }, ], notes: [ { category: "general", text: "The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1833", url: "https://www.suse.com/security/cve/CVE-2016-1833", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1833", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981108 for CVE-2016-1833", url: "https://bugzilla.suse.com/981108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-1833", }, { cve: "CVE-2016-1834", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1834", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1834", url: "https://www.suse.com/security/cve/CVE-2016-1834", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1834", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981041 for CVE-2016-1834", url: "https://bugzilla.suse.com/981041", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-1834", }, { cve: "CVE-2016-1835", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1835", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1835", url: "https://www.suse.com/security/cve/CVE-2016-1835", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1835", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981109 for CVE-2016-1835", url: "https://bugzilla.suse.com/981109", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-1835", }, { cve: "CVE-2016-1837", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1837", }, ], notes: [ { category: "general", text: "Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1837", url: "https://www.suse.com/security/cve/CVE-2016-1837", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1837", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981111 for CVE-2016-1837", url: "https://bugzilla.suse.com/981111", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-1837", }, { cve: "CVE-2016-1838", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1838", }, ], notes: [ { category: "general", text: "The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1838", url: "https://www.suse.com/security/cve/CVE-2016-1838", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1838", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981112 for CVE-2016-1838", url: "https://bugzilla.suse.com/981112", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-1838", }, { cve: "CVE-2016-1839", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1839", }, ], notes: [ { category: "general", text: "The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1839", url: "https://www.suse.com/security/cve/CVE-2016-1839", }, { category: "external", summary: "SUSE Bug 1039069 for CVE-2016-1839", url: "https://bugzilla.suse.com/1039069", }, { category: "external", summary: "SUSE Bug 1039661 for CVE-2016-1839", url: "https://bugzilla.suse.com/1039661", }, { category: "external", summary: "SUSE Bug 1069433 for CVE-2016-1839", url: "https://bugzilla.suse.com/1069433", }, { category: "external", summary: "SUSE Bug 1069690 for CVE-2016-1839", url: "https://bugzilla.suse.com/1069690", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1839", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 963963 for CVE-2016-1839", url: "https://bugzilla.suse.com/963963", }, { category: "external", summary: "SUSE Bug 981114 for CVE-2016-1839", url: "https://bugzilla.suse.com/981114", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-1839", }, { cve: "CVE-2016-1840", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1840", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1840", url: "https://www.suse.com/security/cve/CVE-2016-1840", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1840", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981115 for CVE-2016-1840", url: "https://bugzilla.suse.com/981115", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-1840", }, { cve: "CVE-2016-2037", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2037", }, ], notes: [ { category: "general", text: "The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2037", url: "https://www.suse.com/security/cve/CVE-2016-2037", }, { category: "external", summary: "SUSE Bug 1028410 for CVE-2016-2037", url: "https://bugzilla.suse.com/1028410", }, { category: "external", summary: "SUSE Bug 963448 for CVE-2016-2037", url: "https://bugzilla.suse.com/963448", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-2037", }, { cve: "CVE-2016-2073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2073", }, ], notes: [ { category: "general", text: "The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2073", url: "https://www.suse.com/security/cve/CVE-2016-2073", }, { category: "external", summary: "SUSE Bug 963963 for CVE-2016-2073", url: "https://bugzilla.suse.com/963963", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-2073", }, { cve: "CVE-2016-2105", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2105", }, ], notes: [ { category: "general", text: "Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2105", url: "https://www.suse.com/security/cve/CVE-2016-2105", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2105", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977614 for CVE-2016-2105", url: "https://bugzilla.suse.com/977614", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2105", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 989902 for CVE-2016-2105", url: "https://bugzilla.suse.com/989902", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2105", url: "https://bugzilla.suse.com/990369", }, { category: "external", summary: "SUSE Bug 990370 for CVE-2016-2105", url: "https://bugzilla.suse.com/990370", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-2105", }, { cve: "CVE-2016-2106", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2106", }, ], notes: [ { category: "general", text: "Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2106", url: "https://www.suse.com/security/cve/CVE-2016-2106", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2106", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977615 for CVE-2016-2106", url: "https://bugzilla.suse.com/977615", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2106", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 979279 for CVE-2016-2106", url: "https://bugzilla.suse.com/979279", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2106", url: "https://bugzilla.suse.com/990369", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-2106", }, { cve: "CVE-2016-2107", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2107", }, ], notes: [ { category: "general", text: "The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2107", url: "https://www.suse.com/security/cve/CVE-2016-2107", }, { category: "external", summary: "SUSE Bug 976942 for CVE-2016-2107", url: "https://bugzilla.suse.com/976942", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2107", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977616 for CVE-2016-2107", url: "https://bugzilla.suse.com/977616", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2107", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2107", url: "https://bugzilla.suse.com/990369", }, { category: "external", summary: "SUSE Bug 990370 for CVE-2016-2107", url: "https://bugzilla.suse.com/990370", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-2107", }, { cve: "CVE-2016-2108", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2108", }, ], notes: [ { category: "general", text: "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2108", url: "https://www.suse.com/security/cve/CVE-2016-2108", }, { category: "external", summary: "SUSE Bug 1001502 for CVE-2016-2108", url: "https://bugzilla.suse.com/1001502", }, { category: "external", summary: "SUSE Bug 1004499 for CVE-2016-2108", url: "https://bugzilla.suse.com/1004499", }, { category: "external", summary: "SUSE Bug 1005878 for CVE-2016-2108", url: "https://bugzilla.suse.com/1005878", }, { category: "external", summary: "SUSE Bug 1148697 for CVE-2016-2108", url: "https://bugzilla.suse.com/1148697", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2108", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977617 for CVE-2016-2108", url: "https://bugzilla.suse.com/977617", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2108", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 989345 for CVE-2016-2108", url: "https://bugzilla.suse.com/989345", }, { category: "external", summary: "SUSE Bug 996067 for CVE-2016-2108", url: "https://bugzilla.suse.com/996067", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-2108", }, { cve: "CVE-2016-2109", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2109", }, ], notes: [ { category: "general", text: "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2109", url: "https://www.suse.com/security/cve/CVE-2016-2109", }, { category: "external", summary: "SUSE Bug 1015243 for CVE-2016-2109", url: "https://bugzilla.suse.com/1015243", }, { category: "external", summary: "SUSE Bug 976942 for CVE-2016-2109", url: "https://bugzilla.suse.com/976942", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2109", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2109", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2109", url: "https://bugzilla.suse.com/990369", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-2109", }, { cve: "CVE-2016-2177", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2177", }, ], notes: [ { category: "general", text: "OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2177", url: "https://www.suse.com/security/cve/CVE-2016-2177", }, { category: "external", summary: "SUSE Bug 982575 for CVE-2016-2177", url: "https://bugzilla.suse.com/982575", }, { category: "external", summary: "SUSE Bug 999075 for CVE-2016-2177", url: "https://bugzilla.suse.com/999075", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2177", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-2177", }, { cve: "CVE-2016-2178", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2178", }, ], notes: [ { category: "general", text: "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2178", url: "https://www.suse.com/security/cve/CVE-2016-2178", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2178", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 983249 for CVE-2016-2178", url: "https://bugzilla.suse.com/983249", }, { category: "external", summary: "SUSE Bug 983519 for CVE-2016-2178", url: "https://bugzilla.suse.com/983519", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2178", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-2178", }, { cve: "CVE-2016-2179", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2179", }, ], notes: [ { category: "general", text: "The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2179", url: "https://www.suse.com/security/cve/CVE-2016-2179", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2179", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2179", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2179", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-2179", }, { cve: "CVE-2016-2180", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2180", }, ], notes: [ { category: "general", text: "The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the \"openssl ts\" command.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2180", url: "https://www.suse.com/security/cve/CVE-2016-2180", }, { category: "external", summary: "SUSE Bug 1003811 for CVE-2016-2180", url: "https://bugzilla.suse.com/1003811", }, { category: "external", summary: "SUSE Bug 990419 for CVE-2016-2180", url: "https://bugzilla.suse.com/990419", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2180", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-2180", }, { cve: "CVE-2016-2181", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2181", }, ], notes: [ { category: "general", text: "The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2181", url: "https://www.suse.com/security/cve/CVE-2016-2181", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2181", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 994749 for CVE-2016-2181", url: "https://bugzilla.suse.com/994749", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2181", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2181", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-2181", }, { cve: "CVE-2016-2182", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2182", }, ], notes: [ { category: "general", text: "The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2182", url: "https://www.suse.com/security/cve/CVE-2016-2182", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2182", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 993819 for CVE-2016-2182", url: "https://bugzilla.suse.com/993819", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2182", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995959 for CVE-2016-2182", url: "https://bugzilla.suse.com/995959", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2182", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-2182", }, { cve: "CVE-2016-2183", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2183", }, ], notes: [ { category: "general", text: "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2183", url: "https://www.suse.com/security/cve/CVE-2016-2183", }, { category: "external", summary: "SUSE Bug 1001912 for CVE-2016-2183", url: "https://bugzilla.suse.com/1001912", }, { category: "external", summary: "SUSE Bug 1024218 for CVE-2016-2183", url: "https://bugzilla.suse.com/1024218", }, { category: "external", summary: "SUSE Bug 1027038 for CVE-2016-2183", url: "https://bugzilla.suse.com/1027038", }, { category: "external", summary: "SUSE Bug 1034689 for CVE-2016-2183", url: "https://bugzilla.suse.com/1034689", }, { category: "external", summary: "SUSE Bug 1056614 for CVE-2016-2183", url: "https://bugzilla.suse.com/1056614", }, { category: "external", summary: "SUSE Bug 1171693 for CVE-2016-2183", url: "https://bugzilla.suse.com/1171693", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2183", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995359 for CVE-2016-2183", url: "https://bugzilla.suse.com/995359", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-2183", }, { cve: "CVE-2016-2381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2381", }, ], notes: [ { category: "general", text: "Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2381", url: "https://www.suse.com/security/cve/CVE-2016-2381", }, { category: "external", summary: "SUSE Bug 967082 for CVE-2016-2381", url: "https://bugzilla.suse.com/967082", }, { category: "external", summary: "SUSE Bug 992991 for CVE-2016-2381", url: "https://bugzilla.suse.com/992991", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-2381", }, { cve: "CVE-2016-3075", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3075", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3075", url: "https://www.suse.com/security/cve/CVE-2016-3075", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2016-3075", url: "https://bugzilla.suse.com/1123874", }, { category: "external", summary: "SUSE Bug 973164 for CVE-2016-3075", url: "https://bugzilla.suse.com/973164", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-3075", }, { cve: "CVE-2016-3191", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3191", }, ], notes: [ { category: "general", text: "The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3191", url: "https://www.suse.com/security/cve/CVE-2016-3191", }, { category: "external", summary: "SUSE Bug 971741 for CVE-2016-3191", url: "https://bugzilla.suse.com/971741", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-3191", }, { cve: "CVE-2016-3627", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3627", }, ], notes: [ { category: "general", text: "The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3627", url: "https://www.suse.com/security/cve/CVE-2016-3627", }, { category: "external", summary: "SUSE Bug 1026099 for CVE-2016-3627", url: "https://bugzilla.suse.com/1026099", }, { category: "external", summary: "SUSE Bug 1026101 for CVE-2016-3627", url: "https://bugzilla.suse.com/1026101", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-3627", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 972335 for CVE-2016-3627", url: "https://bugzilla.suse.com/972335", }, { category: "external", summary: "SUSE Bug 975947 for CVE-2016-3627", url: "https://bugzilla.suse.com/975947", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-3627", }, { cve: "CVE-2016-3705", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3705", }, ], notes: [ { category: "general", text: "The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3705", url: "https://www.suse.com/security/cve/CVE-2016-3705", }, { category: "external", summary: "SUSE Bug 1017497 for CVE-2016-3705", url: "https://bugzilla.suse.com/1017497", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-3705", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 975947 for CVE-2016-3705", url: "https://bugzilla.suse.com/975947", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-3705", }, { cve: "CVE-2016-3706", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3706", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3706", url: "https://www.suse.com/security/cve/CVE-2016-3706", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2016-3706", url: "https://bugzilla.suse.com/1123874", }, { category: "external", summary: "SUSE Bug 980483 for CVE-2016-3706", url: "https://bugzilla.suse.com/980483", }, { category: "external", summary: "SUSE Bug 997423 for CVE-2016-3706", url: "https://bugzilla.suse.com/997423", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-3706", }, { cve: "CVE-2016-4008", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4008", }, ], notes: [ { category: "general", text: "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4008", url: "https://www.suse.com/security/cve/CVE-2016-4008", }, { category: "external", summary: "SUSE Bug 982779 for CVE-2016-4008", url: "https://bugzilla.suse.com/982779", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-4008", }, { cve: "CVE-2016-4429", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4429", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4429", url: "https://www.suse.com/security/cve/CVE-2016-4429", }, { category: "external", summary: "SUSE Bug 1081556 for CVE-2016-4429", url: "https://bugzilla.suse.com/1081556", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2016-4429", url: "https://bugzilla.suse.com/1123874", }, { category: "external", summary: "SUSE Bug 980854 for CVE-2016-4429", url: "https://bugzilla.suse.com/980854", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-4429", }, { cve: "CVE-2016-4447", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4447", }, ], notes: [ { category: "general", text: "The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4447", url: "https://www.suse.com/security/cve/CVE-2016-4447", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4447", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981548 for CVE-2016-4447", url: "https://bugzilla.suse.com/981548", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-4447", }, { cve: "CVE-2016-4448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4448", }, ], notes: [ { category: "general", text: "Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4448", url: "https://www.suse.com/security/cve/CVE-2016-4448", }, { category: "external", summary: "SUSE Bug 1010299 for CVE-2016-4448", url: "https://bugzilla.suse.com/1010299", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4448", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981549 for CVE-2016-4448", url: "https://bugzilla.suse.com/981549", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-4448", }, { cve: "CVE-2016-4449", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4449", }, ], notes: [ { category: "general", text: "XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4449", url: "https://www.suse.com/security/cve/CVE-2016-4449", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4449", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981550 for CVE-2016-4449", url: "https://bugzilla.suse.com/981550", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-4449", }, { cve: "CVE-2016-4483", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4483", }, ], notes: [ { category: "general", text: "The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4483", url: "https://www.suse.com/security/cve/CVE-2016-4483", }, { category: "external", summary: "SUSE Bug 1026101 for CVE-2016-4483", url: "https://bugzilla.suse.com/1026101", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4483", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 978395 for CVE-2016-4483", url: "https://bugzilla.suse.com/978395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-4483", }, { cve: "CVE-2016-4574", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4574", }, ], notes: [ { category: "general", text: "Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4574", url: "https://www.suse.com/security/cve/CVE-2016-4574", }, { category: "external", summary: "SUSE Bug 1135436 for CVE-2016-4574", url: "https://bugzilla.suse.com/1135436", }, { category: "external", summary: "SUSE Bug 979261 for CVE-2016-4574", url: "https://bugzilla.suse.com/979261", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-4574", }, { cve: "CVE-2016-4579", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4579", }, ], notes: [ { category: "general", text: "Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the \"returned length of the object from _ksba_ber_parse_tl.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4579", url: "https://www.suse.com/security/cve/CVE-2016-4579", }, { category: "external", summary: "SUSE Bug 1135436 for CVE-2016-4579", url: "https://bugzilla.suse.com/1135436", }, { category: "external", summary: "SUSE Bug 979906 for CVE-2016-4579", url: "https://bugzilla.suse.com/979906", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-4579", }, { cve: "CVE-2016-4658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4658", }, ], notes: [ { category: "general", text: "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4658", url: "https://www.suse.com/security/cve/CVE-2016-4658", }, { category: "external", summary: "SUSE Bug 1005544 for CVE-2016-4658", url: "https://bugzilla.suse.com/1005544", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2016-4658", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1069433 for CVE-2016-4658", url: "https://bugzilla.suse.com/1069433", }, { category: "external", summary: "SUSE Bug 1078813 for CVE-2016-4658", url: "https://bugzilla.suse.com/1078813", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4658", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-4658", }, { cve: "CVE-2016-5011", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5011", }, ], notes: [ { category: "general", text: "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5011", url: "https://www.suse.com/security/cve/CVE-2016-5011", }, { category: "external", summary: "SUSE Bug 988361 for CVE-2016-5011", url: "https://bugzilla.suse.com/988361", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-5011", }, { cve: "CVE-2016-5300", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5300", }, ], notes: [ { category: "general", text: "The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5300", url: "https://www.suse.com/security/cve/CVE-2016-5300", }, { category: "external", summary: "SUSE Bug 983216 for CVE-2016-5300", url: "https://bugzilla.suse.com/983216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-5300", }, { cve: "CVE-2016-5419", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5419", }, ], notes: [ { category: "general", text: "curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5419", url: "https://www.suse.com/security/cve/CVE-2016-5419", }, { category: "external", summary: "SUSE Bug 1033413 for CVE-2016-5419", url: "https://bugzilla.suse.com/1033413", }, { category: "external", summary: "SUSE Bug 1033442 for CVE-2016-5419", url: "https://bugzilla.suse.com/1033442", }, { category: "external", summary: "SUSE Bug 991389 for CVE-2016-5419", url: "https://bugzilla.suse.com/991389", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-5419", }, { cve: "CVE-2016-5420", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5420", }, ], notes: [ { category: "general", text: "curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5420", url: "https://www.suse.com/security/cve/CVE-2016-5420", }, { category: "external", summary: "SUSE Bug 991390 for CVE-2016-5420", url: "https://bugzilla.suse.com/991390", }, { category: "external", summary: "SUSE Bug 997420 for CVE-2016-5420", url: "https://bugzilla.suse.com/997420", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-5420", }, { cve: "CVE-2016-5421", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5421", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5421", url: "https://www.suse.com/security/cve/CVE-2016-5421", }, { category: "external", summary: "SUSE Bug 991391 for CVE-2016-5421", url: "https://bugzilla.suse.com/991391", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-5421", }, { cve: "CVE-2016-6185", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6185", }, ], notes: [ { category: "general", text: "The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6185", url: "https://www.suse.com/security/cve/CVE-2016-6185", }, { category: "external", summary: "SUSE Bug 988311 for CVE-2016-6185", url: "https://bugzilla.suse.com/988311", }, { category: "external", summary: "SUSE Bug 999993 for CVE-2016-6185", url: "https://bugzilla.suse.com/999993", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-6185", }, { cve: "CVE-2016-6261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6261", }, ], notes: [ { category: "general", text: "The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6261", url: "https://www.suse.com/security/cve/CVE-2016-6261", }, { category: "external", summary: "SUSE Bug 1118435 for CVE-2016-6261", url: "https://bugzilla.suse.com/1118435", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2016-6261", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 990190 for CVE-2016-6261", url: "https://bugzilla.suse.com/990190", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-6261", }, { cve: "CVE-2016-6262", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6262", }, ], notes: [ { category: "general", text: "idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6262", url: "https://www.suse.com/security/cve/CVE-2016-6262", }, { category: "external", summary: "SUSE Bug 1014473 for CVE-2016-6262", url: "https://bugzilla.suse.com/1014473", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2016-6262", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 1190777 for CVE-2016-6262", url: "https://bugzilla.suse.com/1190777", }, { category: "external", summary: "SUSE Bug 990189 for CVE-2016-6262", url: "https://bugzilla.suse.com/990189", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-6262", }, { cve: "CVE-2016-6263", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6263", }, ], notes: [ { category: "general", text: "The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6263", url: "https://www.suse.com/security/cve/CVE-2016-6263", }, { category: "external", summary: "SUSE Bug 1118435 for CVE-2016-6263", url: "https://bugzilla.suse.com/1118435", }, { category: "external", summary: "SUSE Bug 990191 for CVE-2016-6263", url: "https://bugzilla.suse.com/990191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-6263", }, { cve: "CVE-2016-6302", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6302", }, ], notes: [ { category: "general", text: "The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6302", url: "https://www.suse.com/security/cve/CVE-2016-6302", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6302", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-6302", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995324 for CVE-2016-6302", url: "https://bugzilla.suse.com/995324", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6302", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-6302", }, { cve: "CVE-2016-6303", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6303", }, ], notes: [ { category: "general", text: "Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6303", url: "https://www.suse.com/security/cve/CVE-2016-6303", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6303", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-6303", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-6303", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995377 for CVE-2016-6303", url: "https://bugzilla.suse.com/995377", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6303", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-6303", }, { cve: "CVE-2016-6304", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6304", }, ], notes: [ { category: "general", text: "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6304", url: "https://www.suse.com/security/cve/CVE-2016-6304", }, { category: "external", summary: "SUSE Bug 1001706 for CVE-2016-6304", url: "https://bugzilla.suse.com/1001706", }, { category: "external", summary: "SUSE Bug 1003811 for CVE-2016-6304", url: "https://bugzilla.suse.com/1003811", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6304", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 1005579 for CVE-2016-6304", url: "https://bugzilla.suse.com/1005579", }, { category: "external", summary: "SUSE Bug 1021375 for CVE-2016-6304", url: "https://bugzilla.suse.com/1021375", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6304", url: "https://bugzilla.suse.com/999665", }, { category: "external", summary: "SUSE Bug 999666 for CVE-2016-6304", url: "https://bugzilla.suse.com/999666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-6304", }, { cve: "CVE-2016-6306", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6306", }, ], notes: [ { category: "general", text: "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6306", url: "https://www.suse.com/security/cve/CVE-2016-6306", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6306", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6306", url: "https://bugzilla.suse.com/999665", }, { category: "external", summary: "SUSE Bug 999668 for CVE-2016-6306", url: "https://bugzilla.suse.com/999668", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-6306", }, { cve: "CVE-2016-6313", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6313", }, ], notes: [ { category: "general", text: "The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6313", url: "https://www.suse.com/security/cve/CVE-2016-6313", }, { category: "external", summary: "SUSE Bug 1123792 for CVE-2016-6313", url: "https://bugzilla.suse.com/1123792", }, { category: "external", summary: "SUSE Bug 994157 for CVE-2016-6313", url: "https://bugzilla.suse.com/994157", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-6313", }, { cve: "CVE-2016-6318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6318", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6318", url: "https://www.suse.com/security/cve/CVE-2016-6318", }, { category: "external", summary: "SUSE Bug 1123113 for CVE-2016-6318", url: "https://bugzilla.suse.com/1123113", }, { category: "external", summary: "SUSE Bug 992966 for CVE-2016-6318", url: "https://bugzilla.suse.com/992966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-6318", }, { cve: "CVE-2016-7056", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7056", }, ], notes: [ { category: "general", text: "A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7056", url: "https://www.suse.com/security/cve/CVE-2016-7056", }, { category: "external", summary: "SUSE Bug 1005878 for CVE-2016-7056", url: "https://bugzilla.suse.com/1005878", }, { category: "external", summary: "SUSE Bug 1019334 for CVE-2016-7056", url: "https://bugzilla.suse.com/1019334", }, { category: "external", summary: "SUSE Bug 1148697 for CVE-2016-7056", url: "https://bugzilla.suse.com/1148697", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-7056", }, { cve: "CVE-2016-7141", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7141", }, ], notes: [ { category: "general", text: "curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7141", url: "https://www.suse.com/security/cve/CVE-2016-7141", }, { category: "external", summary: "SUSE Bug 991390 for CVE-2016-7141", url: "https://bugzilla.suse.com/991390", }, { category: "external", summary: "SUSE Bug 997420 for CVE-2016-7141", url: "https://bugzilla.suse.com/997420", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-7141", }, { cve: "CVE-2016-7167", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7167", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7167", url: "https://www.suse.com/security/cve/CVE-2016-7167", }, { category: "external", summary: "SUSE Bug 998760 for CVE-2016-7167", url: "https://bugzilla.suse.com/998760", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-7167", }, { cve: "CVE-2016-7543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7543", }, ], notes: [ { category: "general", text: "Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7543", url: "https://www.suse.com/security/cve/CVE-2016-7543", }, { category: "external", summary: "SUSE Bug 1001299 for CVE-2016-7543", url: "https://bugzilla.suse.com/1001299", }, { category: "external", summary: "SUSE Bug 1159416 for CVE-2016-7543", url: "https://bugzilla.suse.com/1159416", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-7543", }, { cve: "CVE-2016-7796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7796", }, ], notes: [ { category: "general", text: "The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7796", url: "https://www.suse.com/security/cve/CVE-2016-7796", }, { category: "external", summary: "SUSE Bug 1001765 for CVE-2016-7796", url: "https://bugzilla.suse.com/1001765", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-7796", }, { cve: "CVE-2016-8610", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8610", }, ], notes: [ { category: "general", text: "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8610", url: "https://www.suse.com/security/cve/CVE-2016-8610", }, { category: "external", summary: "SUSE Bug 1005878 for CVE-2016-8610", url: "https://bugzilla.suse.com/1005878", }, { category: "external", summary: "SUSE Bug 1005879 for CVE-2016-8610", url: "https://bugzilla.suse.com/1005879", }, { category: "external", summary: "SUSE Bug 1110018 for CVE-2016-8610", url: "https://bugzilla.suse.com/1110018", }, { category: "external", summary: "SUSE Bug 1120592 for CVE-2016-8610", url: "https://bugzilla.suse.com/1120592", }, { category: "external", summary: "SUSE Bug 1126909 for CVE-2016-8610", url: "https://bugzilla.suse.com/1126909", }, { category: "external", summary: "SUSE Bug 1148697 for CVE-2016-8610", url: "https://bugzilla.suse.com/1148697", }, { category: "external", summary: "SUSE Bug 982575 for CVE-2016-8610", url: "https://bugzilla.suse.com/982575", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2016-8610", }, { cve: "CVE-2016-8615", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8615", }, ], notes: [ { category: "general", text: "A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8615", url: "https://www.suse.com/security/cve/CVE-2016-8615", }, { category: "external", summary: "SUSE Bug 1005633 for CVE-2016-8615", url: "https://bugzilla.suse.com/1005633", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-8615", }, { cve: "CVE-2016-8616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8616", }, ], notes: [ { category: "general", text: "A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8616", url: "https://www.suse.com/security/cve/CVE-2016-8616", }, { category: "external", summary: "SUSE Bug 1005634 for CVE-2016-8616", url: "https://bugzilla.suse.com/1005634", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-8616", }, { cve: "CVE-2016-8617", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8617", }, ], notes: [ { category: "general", text: "The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8617", url: "https://www.suse.com/security/cve/CVE-2016-8617", }, { category: "external", summary: "SUSE Bug 1005635 for CVE-2016-8617", url: "https://bugzilla.suse.com/1005635", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-8617", }, { cve: "CVE-2016-8618", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8618", }, ], notes: [ { category: "general", text: "The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8618", url: "https://www.suse.com/security/cve/CVE-2016-8618", }, { category: "external", summary: "SUSE Bug 1005637 for CVE-2016-8618", url: "https://bugzilla.suse.com/1005637", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-8618", }, { cve: "CVE-2016-8619", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8619", }, ], notes: [ { category: "general", text: "The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8619", url: "https://www.suse.com/security/cve/CVE-2016-8619", }, { category: "external", summary: "SUSE Bug 1005638 for CVE-2016-8619", url: "https://bugzilla.suse.com/1005638", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-8619", }, { cve: "CVE-2016-8620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8620", }, ], notes: [ { category: "general", text: "The 'globbing' feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8620", url: "https://www.suse.com/security/cve/CVE-2016-8620", }, { category: "external", summary: "SUSE Bug 1005640 for CVE-2016-8620", url: "https://bugzilla.suse.com/1005640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-8620", }, { cve: "CVE-2016-8621", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8621", }, ], notes: [ { category: "general", text: "The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8621", url: "https://www.suse.com/security/cve/CVE-2016-8621", }, { category: "external", summary: "SUSE Bug 1005642 for CVE-2016-8621", url: "https://bugzilla.suse.com/1005642", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-8621", }, { cve: "CVE-2016-8622", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8622", }, ], notes: [ { category: "general", text: "The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8622", url: "https://www.suse.com/security/cve/CVE-2016-8622", }, { category: "external", summary: "SUSE Bug 1005643 for CVE-2016-8622", url: "https://bugzilla.suse.com/1005643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-8622", }, { cve: "CVE-2016-8623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8623", }, ], notes: [ { category: "general", text: "A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8623", url: "https://www.suse.com/security/cve/CVE-2016-8623", }, { category: "external", summary: "SUSE Bug 1005645 for CVE-2016-8623", url: "https://bugzilla.suse.com/1005645", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2016-8623", }, { cve: "CVE-2016-8624", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8624", }, ], notes: [ { category: "general", text: "curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8624", url: "https://www.suse.com/security/cve/CVE-2016-8624", }, { category: "external", summary: "SUSE Bug 1005646 for CVE-2016-8624", url: "https://bugzilla.suse.com/1005646", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-8624", }, { cve: "CVE-2016-9063", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9063", }, ], notes: [ { category: "general", text: "An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9063", url: "https://www.suse.com/security/cve/CVE-2016-9063", }, { category: "external", summary: "SUSE Bug 1009026 for CVE-2016-9063", url: "https://bugzilla.suse.com/1009026", }, { category: "external", summary: "SUSE Bug 1010424 for CVE-2016-9063", url: "https://bugzilla.suse.com/1010424", }, { category: "external", summary: "SUSE Bug 1047240 for CVE-2016-9063", url: "https://bugzilla.suse.com/1047240", }, { category: "external", summary: "SUSE Bug 1123115 for CVE-2016-9063", url: "https://bugzilla.suse.com/1123115", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "critical", }, ], title: "CVE-2016-9063", }, { cve: "CVE-2016-9318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9318", }, ], notes: [ { category: "general", text: "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9318", url: "https://www.suse.com/security/cve/CVE-2016-9318", }, { category: "external", summary: "SUSE Bug 1010675 for CVE-2016-9318", url: "https://bugzilla.suse.com/1010675", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2016-9318", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1019074 for CVE-2016-9318", url: "https://bugzilla.suse.com/1019074", }, { category: "external", summary: "SUSE Bug 1118959 for CVE-2016-9318", url: "https://bugzilla.suse.com/1118959", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-9318", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 1126613 for CVE-2016-9318", url: "https://bugzilla.suse.com/1126613", }, { category: "external", summary: "SUSE Bug 1148896 for CVE-2016-9318", url: "https://bugzilla.suse.com/1148896", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-9318", }, { cve: "CVE-2016-9586", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9586", }, ], notes: [ { category: "general", text: "curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9586", url: "https://www.suse.com/security/cve/CVE-2016-9586", }, { category: "external", summary: "SUSE Bug 1015332 for CVE-2016-9586", url: "https://bugzilla.suse.com/1015332", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-9586", }, { cve: "CVE-2016-9597", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9597", }, ], notes: [ { category: "general", text: "It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression CVE for the same issue as CVE-2016-3705.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9597", url: "https://www.suse.com/security/cve/CVE-2016-9597", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2016-9597", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1017497 for CVE-2016-9597", url: "https://bugzilla.suse.com/1017497", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-9597", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-9597", }, { cve: "CVE-2016-9840", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9840", }, ], notes: [ { category: "general", text: "inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9840", url: "https://www.suse.com/security/cve/CVE-2016-9840", }, { category: "external", summary: "SUSE Bug 1003579 for CVE-2016-9840", url: "https://bugzilla.suse.com/1003579", }, { category: "external", summary: "SUSE Bug 1022633 for CVE-2016-9840", url: "https://bugzilla.suse.com/1022633", }, { category: "external", summary: "SUSE Bug 1023215 for CVE-2016-9840", url: "https://bugzilla.suse.com/1023215", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9840", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1062104 for CVE-2016-9840", url: "https://bugzilla.suse.com/1062104", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9840", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9840", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9840", url: "https://bugzilla.suse.com/1127473", }, { category: "external", summary: "SUSE Bug 1184301 for CVE-2016-9840", url: "https://bugzilla.suse.com/1184301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-9840", }, { cve: "CVE-2016-9841", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9841", }, ], notes: [ { category: "general", text: "inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9841", url: "https://www.suse.com/security/cve/CVE-2016-9841", }, { category: "external", summary: "SUSE Bug 1003579 for CVE-2016-9841", url: "https://bugzilla.suse.com/1003579", }, { category: "external", summary: "SUSE Bug 1022633 for CVE-2016-9841", url: "https://bugzilla.suse.com/1022633", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9841", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1064070 for CVE-2016-9841", url: "https://bugzilla.suse.com/1064070", }, { category: "external", summary: "SUSE Bug 1070162 for CVE-2016-9841", url: "https://bugzilla.suse.com/1070162", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9841", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9841", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9841", url: "https://bugzilla.suse.com/1127473", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-9841", }, { cve: "CVE-2016-9842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9842", }, ], notes: [ { category: "general", text: "The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9842", url: "https://www.suse.com/security/cve/CVE-2016-9842", }, { category: "external", summary: "SUSE Bug 1003580 for CVE-2016-9842", url: "https://bugzilla.suse.com/1003580", }, { category: "external", summary: "SUSE Bug 1022633 for CVE-2016-9842", url: "https://bugzilla.suse.com/1022633", }, { category: "external", summary: "SUSE Bug 1023215 for CVE-2016-9842", url: "https://bugzilla.suse.com/1023215", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9842", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1062104 for CVE-2016-9842", url: "https://bugzilla.suse.com/1062104", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9842", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9842", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9842", url: "https://bugzilla.suse.com/1127473", }, { category: "external", summary: "SUSE Bug 1184301 for CVE-2016-9842", url: "https://bugzilla.suse.com/1184301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-9842", }, { cve: "CVE-2016-9843", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9843", }, ], notes: [ { category: "general", text: "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9843", url: "https://www.suse.com/security/cve/CVE-2016-9843", }, { category: "external", summary: "SUSE Bug 1003580 for CVE-2016-9843", url: "https://bugzilla.suse.com/1003580", }, { category: "external", summary: "SUSE Bug 1013882 for CVE-2016-9843", url: "https://bugzilla.suse.com/1013882", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9843", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1062104 for CVE-2016-9843", url: "https://bugzilla.suse.com/1062104", }, { category: "external", summary: "SUSE Bug 1116686 for CVE-2016-9843", url: "https://bugzilla.suse.com/1116686", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9843", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9843", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9843", url: "https://bugzilla.suse.com/1127473", }, { category: "external", summary: "SUSE Bug 1184301 for CVE-2016-9843", url: "https://bugzilla.suse.com/1184301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2016-9843", }, { cve: "CVE-2017-1000100", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000100", }, ], notes: [ { category: "general", text: "When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000100", url: "https://www.suse.com/security/cve/CVE-2017-1000100", }, { category: "external", summary: "SUSE Bug 1051644 for CVE-2017-1000100", url: "https://bugzilla.suse.com/1051644", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2017-1000100", }, { cve: "CVE-2017-1000101", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000101", }, ], notes: [ { category: "general", text: "curl supports \"globbing\" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000101", url: "https://www.suse.com/security/cve/CVE-2017-1000101", }, { category: "external", summary: "SUSE Bug 1051643 for CVE-2017-1000101", url: "https://bugzilla.suse.com/1051643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-1000101", }, { cve: "CVE-2017-1000366", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000366", }, ], notes: [ { category: "general", text: "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000366", url: "https://www.suse.com/security/cve/CVE-2017-1000366", }, { category: "external", summary: "SUSE Bug 1037551 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1037551", }, { category: "external", summary: "SUSE Bug 1039357 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1039357", }, { category: "external", summary: "SUSE Bug 1063847 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1063847", }, { category: "external", summary: "SUSE Bug 1071319 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1071319", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1123874", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-1000366", }, { cve: "CVE-2017-10684", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10684", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10684", url: "https://www.suse.com/security/cve/CVE-2017-10684", }, { category: "external", summary: "SUSE Bug 1046858 for CVE-2017-10684", url: "https://bugzilla.suse.com/1046858", }, { category: "external", summary: "SUSE Bug 1115932 for CVE-2017-10684", url: "https://bugzilla.suse.com/1115932", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-10684", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-10684", }, { cve: "CVE-2017-10685", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10685", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10685", url: "https://www.suse.com/security/cve/CVE-2017-10685", }, { category: "external", summary: "SUSE Bug 1046853 for CVE-2017-10685", url: "https://bugzilla.suse.com/1046853", }, { category: "external", summary: "SUSE Bug 1115932 for CVE-2017-10685", url: "https://bugzilla.suse.com/1115932", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-10685", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-10685", }, { cve: "CVE-2017-11112", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-11112", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-11112", url: "https://www.suse.com/security/cve/CVE-2017-11112", }, { category: "external", summary: "SUSE Bug 1046853 for CVE-2017-11112", url: "https://bugzilla.suse.com/1046853", }, { category: "external", summary: "SUSE Bug 1047964 for CVE-2017-11112", url: "https://bugzilla.suse.com/1047964", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-11112", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-11112", }, { cve: "CVE-2017-11113", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-11113", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-11113", url: "https://www.suse.com/security/cve/CVE-2017-11113", }, { category: "external", summary: "SUSE Bug 1046853 for CVE-2017-11113", url: "https://bugzilla.suse.com/1046853", }, { category: "external", summary: "SUSE Bug 1047965 for CVE-2017-11113", url: "https://bugzilla.suse.com/1047965", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-11113", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-11113", }, { cve: "CVE-2017-2616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2616", }, ], notes: [ { category: "general", text: "A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-2616", url: "https://www.suse.com/security/cve/CVE-2017-2616", }, { category: "external", summary: "SUSE Bug 1023041 for CVE-2017-2616", url: "https://bugzilla.suse.com/1023041", }, { category: "external", summary: "SUSE Bug 1123789 for CVE-2017-2616", url: "https://bugzilla.suse.com/1123789", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2017-2616", }, { cve: "CVE-2017-3731", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-3731", }, ], notes: [ { category: "general", text: "If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-3731", url: "https://www.suse.com/security/cve/CVE-2017-3731", }, { category: "external", summary: "SUSE Bug 1021641 for CVE-2017-3731", url: "https://bugzilla.suse.com/1021641", }, { category: "external", summary: "SUSE Bug 1022085 for CVE-2017-3731", url: "https://bugzilla.suse.com/1022085", }, { category: "external", summary: "SUSE Bug 1064118 for CVE-2017-3731", url: "https://bugzilla.suse.com/1064118", }, { category: "external", summary: "SUSE Bug 1064119 for CVE-2017-3731", url: "https://bugzilla.suse.com/1064119", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-3731", }, { cve: "CVE-2017-6507", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6507", }, ], notes: [ { category: "general", text: "An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6507", url: "https://www.suse.com/security/cve/CVE-2017-6507", }, { category: "external", summary: "SUSE Bug 1029696 for CVE-2017-6507", url: "https://bugzilla.suse.com/1029696", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-6507", }, { cve: "CVE-2017-7407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7407", }, ], notes: [ { category: "general", text: "The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7407", url: "https://www.suse.com/security/cve/CVE-2017-7407", }, { category: "external", summary: "SUSE Bug 1032309 for CVE-2017-7407", url: "https://bugzilla.suse.com/1032309", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2017-7407", }, { cve: "CVE-2017-7526", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7526", }, ], notes: [ { category: "general", text: "libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7526", url: "https://www.suse.com/security/cve/CVE-2017-7526", }, { category: "external", summary: "SUSE Bug 1046607 for CVE-2017-7526", url: "https://bugzilla.suse.com/1046607", }, { category: "external", summary: "SUSE Bug 1047462 for CVE-2017-7526", url: "https://bugzilla.suse.com/1047462", }, { category: "external", summary: "SUSE Bug 1123792 for CVE-2017-7526", url: "https://bugzilla.suse.com/1123792", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.9, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "low", }, ], title: "CVE-2017-7526", }, { cve: "CVE-2017-9047", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9047", }, ], notes: [ { category: "general", text: "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9047", url: "https://www.suse.com/security/cve/CVE-2017-9047", }, { category: "external", summary: "SUSE Bug 1039063 for CVE-2017-9047", url: "https://bugzilla.suse.com/1039063", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9047", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039657 for CVE-2017-9047", url: "https://bugzilla.suse.com/1039657", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2017-9047", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-9047", }, { cve: "CVE-2017-9048", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9048", }, ], notes: [ { category: "general", text: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9048", url: "https://www.suse.com/security/cve/CVE-2017-9048", }, { category: "external", summary: "SUSE Bug 1039064 for CVE-2017-9048", url: "https://bugzilla.suse.com/1039064", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9048", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039658 for CVE-2017-9048", url: "https://bugzilla.suse.com/1039658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "moderate", }, ], title: "CVE-2017-9048", }, { cve: "CVE-2017-9049", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9049", }, ], notes: [ { category: "general", text: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9049", url: "https://www.suse.com/security/cve/CVE-2017-9049", }, { category: "external", summary: "SUSE Bug 1039063 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039063", }, { category: "external", summary: "SUSE Bug 1039064 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039064", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039659 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039659", }, { category: "external", summary: "SUSE Bug 1039661 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039661", }, { category: "external", summary: "SUSE Bug 1069690 for CVE-2017-9049", url: "https://bugzilla.suse.com/1069690", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2017-9049", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2017-9049", }, { cve: "CVE-2017-9050", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9050", }, ], notes: [ { category: "general", text: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9050", url: "https://www.suse.com/security/cve/CVE-2017-9050", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9050", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039069 for CVE-2017-9050", url: "https://bugzilla.suse.com/1039069", }, { category: "external", summary: "SUSE Bug 1039661 for CVE-2017-9050", url: "https://bugzilla.suse.com/1039661", }, { category: "external", summary: "SUSE Bug 1069433 for CVE-2017-9050", url: "https://bugzilla.suse.com/1069433", }, { category: "external", summary: "SUSE Bug 1069690 for CVE-2017-9050", url: "https://bugzilla.suse.com/1069690", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2017-9050", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2017-9050", }, { cve: "CVE-2017-9233", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9233", }, ], notes: [ { category: "general", text: "XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9233", url: "https://www.suse.com/security/cve/CVE-2017-9233", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9233", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1047236 for CVE-2017-9233", url: "https://bugzilla.suse.com/1047236", }, { category: "external", summary: "SUSE Bug 1073350 for CVE-2017-9233", url: "https://bugzilla.suse.com/1073350", }, { category: "external", summary: "SUSE Bug 1123115 for CVE-2017-9233", url: "https://bugzilla.suse.com/1123115", }, { category: "external", summary: "SUSE Bug 983216 for CVE-2017-9233", url: "https://bugzilla.suse.com/983216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:36Z", details: "important", }, ], title: "CVE-2017-9233", }, ], }
suse-su-2017:2699-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for SLES 12 Docker image", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise Server 12 container image has been updated to include\nsecurity and stability fixes.\n\nThe following issues related to building of the container images have been fixed:\n\n- Included krb5 package to avoid the inclusion of krb5-mini which gets selected as a\n dependency by the Build Service solver. (bsc#1056193)\n- Do not install recommended packages when building container images. (bsc#975726)\n\nA number of security issues that have been already fixed by updates released for\nSUSE Linux Enterprise Server 12 are now included in the base image. A package/CVE\ncross-reference is available below.\n\npam:\n\n- CVE-2015-3238\n\nlibtasn1:\n\n- CVE-2015-3622\n- CVE-2016-4008\n\nlibidn:\n\n- CVE-2015-2059\n- CVE-2015-8948\n- CVE-2016-6261\n- CVE-2016-6262\n- CVE-2016-6263\n\nzlib:\n\n- CVE-2016-9840\n- CVE-2016-9841\n- CVE-2016-9842\n- CVE-2016-9843\n\ncurl:\n\n- CVE-2016-5419\n- CVE-2016-5420\n- CVE-2016-5421\n- CVE-2016-7141\n- CVE-2016-7167\n- CVE-2016-8615\n- CVE-2016-8616\n- CVE-2016-8617\n- CVE-2016-8618\n- CVE-2016-8619\n- CVE-2016-8620\n- CVE-2016-8621\n- CVE-2016-8622\n- CVE-2016-8623\n- CVE-2016-8624\n- CVE-2016-9586\n- CVE-2017-1000100\n- CVE-2017-1000101\n- CVE-2017-7407\n\nopenssl:\n\n- CVE-2016-2105\n- CVE-2016-2106\n- CVE-2016-2107\n- CVE-2016-2108\n- CVE-2016-2109\n- CVE-2016-2177\n- CVE-2016-2178\n- CVE-2016-2179\n- CVE-2016-2180\n- CVE-2016-2181\n- CVE-2016-2182\n- CVE-2016-2183\n- CVE-2016-6302\n- CVE-2016-6303\n- CVE-2016-6304\n- CVE-2016-6306\n\nlibxml2:\n\n- CVE-2014-0191\n- CVE-2015-8806\n- CVE-2016-1762\n- CVE-2016-1833\n- CVE-2016-1834\n- CVE-2016-1835\n- CVE-2016-1837\n- CVE-2016-1838\n- CVE-2016-1839\n- CVE-2016-1840\n- CVE-2016-2073\n- CVE-2016-3627\n- CVE-2016-3705\n- CVE-2016-4447\n- CVE-2016-4448\n- CVE-2016-4449\n- CVE-2016-4483\n- CVE-2016-4658\n- CVE-2016-9318\n- CVE-2016-9597\n- CVE-2017-9047\n- CVE-2017-9048\n- CVE-2017-9049\n- CVE-2017-9050\n\nutil-linux:\n\n- CVE-2015-5218\n- CVE-2016-5011\n- CVE-2017-2616\n\ncracklib:\n\n- CVE-2016-6318\n\nsystemd:\n\n- CVE-2014-9770\n- CVE-2015-8842\n- CVE-2016-7796\n\npcre:\n\n- CVE-2014-8964\n- CVE-2015-2325\n- CVE-2015-2327\n- CVE-2015-2328\n- CVE-2015-3210\n- CVE-2015-3217\n- CVE-2015-5073\n- CVE-2015-8380\n- CVE-2015-8381\n- CVE-2015-8382\n- CVE-2015-8383\n- CVE-2015-8384\n- CVE-2015-8385\n- CVE-2015-8386\n- CVE-2015-8387\n- CVE-2015-8388\n- CVE-2015-8389\n- CVE-2015-8390\n- CVE-2015-8391\n- CVE-2015-8392\n- CVE-2015-8393\n- CVE-2015-8394\n- CVE-2015-8395\n- CVE-2016-1283\n- CVE-2016-3191\n\nappamor:\n\n- CVE-2017-6507\n\nbash:\n\n- CVE-2014-6277\n- CVE-2014-6278\n- CVE-2016-0634\n- CVE-2016-7543\n\ncpio:\n\n- CVE-2016-2037\n\nglibc:\n\n- CVE-2016-1234\n- CVE-2016-3075\n- CVE-2016-3706\n- CVE-2016-4429\n- CVE-2017-1000366\n\nperl:\n\n- CVE-2015-8853\n- CVE-2016-1238\n- CVE-2016-2381\n- CVE-2016-6185\n\nlibssh2_org:\n\n- CVE-2016-0787\n\nexpat:\n\n- CVE-2012-6702\n- CVE-2015-1283\n- CVE-2016-0718\n- CVE-2016-5300\n- CVE-2016-9063\n- CVE-2017-9233\n\nncurses:\n\n- CVE-2017-10684\n- CVE-2017-10685\n- CVE-2017-11112\n- CVE-2017-11113\n\nlibksba:\n\n- CVE-2016-4574\n- CVE-2016-4579\n\nlibgcrypt:\n\n- CVE-2015-7511\n- CVE-2016-6313\n- CVE-2017-7526\n\ndbus-1:\n\n- CVE-2014-7824\n- CVE-2015-0245\n\nFinally, the following packages received non-security fixes:\n\n- augeas\n- bzip2\n- ca-certificates-mozilla\n- coreutils\n- cryptsetup\n- cyrus-sasl\n- dirmngr\n- e2fsprogs\n- findutils\n- gpg2\n- insserv-compat\n- kmod\n- libcap\n- libsolv\n- libzypp\n- openldap2\n- p11-kit\n- permissions\n- procps\n- rpm\n- sed\n- shadow\n- zypper\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Module-Containers-12-2017-1672", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2699-1.json", }, { category: "self", summary: "URL for SUSE-SU-2017:2699-1", url: "https://www.suse.com/support/update/announcement/2017/suse-su-20172699-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2017:2699-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html", }, { category: "self", summary: "SUSE Bug 1056193", url: "https://bugzilla.suse.com/1056193", }, { category: "self", summary: "SUSE Bug 975726", url: "https://bugzilla.suse.com/975726", }, { category: "self", summary: "SUSE CVE CVE-2012-6702 page", url: "https://www.suse.com/security/cve/CVE-2012-6702/", }, { category: "self", summary: "SUSE CVE CVE-2014-0191 page", url: "https://www.suse.com/security/cve/CVE-2014-0191/", }, { category: "self", summary: "SUSE CVE CVE-2014-6271 page", url: "https://www.suse.com/security/cve/CVE-2014-6271/", }, { category: "self", summary: "SUSE CVE CVE-2014-6277 page", url: "https://www.suse.com/security/cve/CVE-2014-6277/", }, { category: "self", summary: "SUSE CVE CVE-2014-6278 page", url: "https://www.suse.com/security/cve/CVE-2014-6278/", }, { category: "self", summary: "SUSE CVE CVE-2014-7169 page", url: "https://www.suse.com/security/cve/CVE-2014-7169/", }, { category: "self", summary: "SUSE CVE CVE-2014-7187 page", url: "https://www.suse.com/security/cve/CVE-2014-7187/", }, { category: "self", summary: "SUSE CVE CVE-2014-7824 page", url: "https://www.suse.com/security/cve/CVE-2014-7824/", }, { category: "self", summary: "SUSE CVE CVE-2014-8964 page", url: "https://www.suse.com/security/cve/CVE-2014-8964/", }, { category: "self", summary: "SUSE CVE CVE-2014-9770 page", url: "https://www.suse.com/security/cve/CVE-2014-9770/", }, { category: "self", summary: "SUSE CVE CVE-2015-0245 page", url: "https://www.suse.com/security/cve/CVE-2015-0245/", }, { category: "self", summary: "SUSE CVE CVE-2015-1283 page", url: "https://www.suse.com/security/cve/CVE-2015-1283/", }, { category: "self", summary: "SUSE CVE CVE-2015-2059 page", url: "https://www.suse.com/security/cve/CVE-2015-2059/", }, { category: "self", summary: "SUSE CVE CVE-2015-2325 page", url: "https://www.suse.com/security/cve/CVE-2015-2325/", }, { category: "self", summary: "SUSE CVE CVE-2015-2327 page", url: "https://www.suse.com/security/cve/CVE-2015-2327/", }, { category: "self", summary: "SUSE CVE CVE-2015-2328 page", url: "https://www.suse.com/security/cve/CVE-2015-2328/", }, { category: "self", summary: "SUSE CVE CVE-2015-3210 page", url: "https://www.suse.com/security/cve/CVE-2015-3210/", }, { category: "self", summary: "SUSE CVE CVE-2015-3217 page", url: "https://www.suse.com/security/cve/CVE-2015-3217/", }, { category: "self", summary: "SUSE CVE CVE-2015-3238 page", url: "https://www.suse.com/security/cve/CVE-2015-3238/", }, { category: "self", summary: "SUSE CVE CVE-2015-3622 page", url: "https://www.suse.com/security/cve/CVE-2015-3622/", }, { category: "self", summary: "SUSE CVE CVE-2015-5073 page", url: "https://www.suse.com/security/cve/CVE-2015-5073/", }, { category: "self", summary: "SUSE CVE CVE-2015-5218 page", url: "https://www.suse.com/security/cve/CVE-2015-5218/", }, { category: "self", summary: "SUSE CVE CVE-2015-5276 page", url: "https://www.suse.com/security/cve/CVE-2015-5276/", }, { category: "self", summary: "SUSE CVE CVE-2015-7511 page", url: "https://www.suse.com/security/cve/CVE-2015-7511/", }, { category: "self", summary: "SUSE CVE CVE-2015-8380 page", url: "https://www.suse.com/security/cve/CVE-2015-8380/", }, { category: "self", summary: "SUSE CVE CVE-2015-8381 page", url: "https://www.suse.com/security/cve/CVE-2015-8381/", }, { category: "self", summary: "SUSE CVE CVE-2015-8382 page", url: "https://www.suse.com/security/cve/CVE-2015-8382/", }, { category: "self", summary: "SUSE CVE CVE-2015-8383 page", url: "https://www.suse.com/security/cve/CVE-2015-8383/", }, { category: "self", summary: "SUSE CVE CVE-2015-8384 page", url: "https://www.suse.com/security/cve/CVE-2015-8384/", }, { category: "self", summary: "SUSE CVE CVE-2015-8385 page", url: "https://www.suse.com/security/cve/CVE-2015-8385/", }, { category: "self", summary: "SUSE CVE CVE-2015-8386 page", url: "https://www.suse.com/security/cve/CVE-2015-8386/", }, { category: "self", summary: "SUSE CVE CVE-2015-8387 page", url: "https://www.suse.com/security/cve/CVE-2015-8387/", }, { category: "self", summary: "SUSE CVE CVE-2015-8388 page", url: "https://www.suse.com/security/cve/CVE-2015-8388/", }, { category: "self", summary: "SUSE CVE CVE-2015-8389 page", url: "https://www.suse.com/security/cve/CVE-2015-8389/", }, { category: "self", summary: "SUSE CVE CVE-2015-8390 page", url: "https://www.suse.com/security/cve/CVE-2015-8390/", }, { category: "self", summary: "SUSE CVE CVE-2015-8391 page", url: "https://www.suse.com/security/cve/CVE-2015-8391/", }, { category: "self", summary: "SUSE CVE CVE-2015-8392 page", url: "https://www.suse.com/security/cve/CVE-2015-8392/", }, { category: "self", summary: "SUSE CVE CVE-2015-8393 page", url: "https://www.suse.com/security/cve/CVE-2015-8393/", }, { category: "self", summary: "SUSE CVE CVE-2015-8394 page", url: "https://www.suse.com/security/cve/CVE-2015-8394/", }, { category: "self", summary: "SUSE CVE CVE-2015-8395 page", url: "https://www.suse.com/security/cve/CVE-2015-8395/", }, { category: "self", summary: "SUSE CVE CVE-2015-8806 page", url: "https://www.suse.com/security/cve/CVE-2015-8806/", }, { category: "self", summary: "SUSE CVE CVE-2015-8842 page", url: "https://www.suse.com/security/cve/CVE-2015-8842/", }, { category: "self", summary: "SUSE CVE CVE-2015-8853 page", url: "https://www.suse.com/security/cve/CVE-2015-8853/", }, { category: "self", summary: "SUSE CVE CVE-2015-8948 page", url: "https://www.suse.com/security/cve/CVE-2015-8948/", }, { category: "self", summary: "SUSE CVE CVE-2016-0634 page", url: "https://www.suse.com/security/cve/CVE-2016-0634/", }, { category: "self", summary: "SUSE CVE CVE-2016-0718 page", url: "https://www.suse.com/security/cve/CVE-2016-0718/", }, { category: "self", summary: "SUSE CVE CVE-2016-0787 page", url: "https://www.suse.com/security/cve/CVE-2016-0787/", }, { category: "self", summary: "SUSE CVE CVE-2016-1234 page", url: "https://www.suse.com/security/cve/CVE-2016-1234/", }, { category: "self", summary: "SUSE CVE CVE-2016-1238 page", url: "https://www.suse.com/security/cve/CVE-2016-1238/", }, { category: "self", summary: "SUSE CVE CVE-2016-1283 page", url: "https://www.suse.com/security/cve/CVE-2016-1283/", }, { category: "self", summary: "SUSE CVE CVE-2016-1762 page", url: "https://www.suse.com/security/cve/CVE-2016-1762/", }, { category: "self", summary: "SUSE CVE CVE-2016-1833 page", url: "https://www.suse.com/security/cve/CVE-2016-1833/", }, { category: "self", summary: "SUSE CVE CVE-2016-1834 page", url: "https://www.suse.com/security/cve/CVE-2016-1834/", }, { category: "self", summary: "SUSE CVE CVE-2016-1835 page", url: "https://www.suse.com/security/cve/CVE-2016-1835/", }, { category: "self", summary: "SUSE CVE CVE-2016-1837 page", url: "https://www.suse.com/security/cve/CVE-2016-1837/", }, { category: "self", summary: "SUSE CVE CVE-2016-1838 page", url: "https://www.suse.com/security/cve/CVE-2016-1838/", }, { category: "self", summary: "SUSE CVE CVE-2016-1839 page", url: "https://www.suse.com/security/cve/CVE-2016-1839/", }, { category: "self", summary: "SUSE CVE CVE-2016-1840 page", url: "https://www.suse.com/security/cve/CVE-2016-1840/", }, { category: "self", summary: "SUSE CVE CVE-2016-2037 page", url: "https://www.suse.com/security/cve/CVE-2016-2037/", }, { category: "self", summary: "SUSE CVE CVE-2016-2073 page", url: "https://www.suse.com/security/cve/CVE-2016-2073/", }, { category: "self", summary: "SUSE CVE CVE-2016-2105 page", url: "https://www.suse.com/security/cve/CVE-2016-2105/", }, { category: "self", summary: "SUSE CVE CVE-2016-2106 page", url: "https://www.suse.com/security/cve/CVE-2016-2106/", }, { category: "self", summary: "SUSE CVE CVE-2016-2107 page", url: "https://www.suse.com/security/cve/CVE-2016-2107/", }, { category: "self", summary: "SUSE CVE CVE-2016-2108 page", url: "https://www.suse.com/security/cve/CVE-2016-2108/", }, { category: "self", summary: "SUSE CVE CVE-2016-2109 page", url: "https://www.suse.com/security/cve/CVE-2016-2109/", }, { category: "self", summary: "SUSE CVE CVE-2016-2177 page", url: "https://www.suse.com/security/cve/CVE-2016-2177/", }, { category: "self", summary: "SUSE CVE CVE-2016-2178 page", url: "https://www.suse.com/security/cve/CVE-2016-2178/", }, { category: "self", summary: "SUSE CVE CVE-2016-2179 page", url: "https://www.suse.com/security/cve/CVE-2016-2179/", }, { category: "self", summary: "SUSE CVE CVE-2016-2180 page", url: "https://www.suse.com/security/cve/CVE-2016-2180/", }, { category: "self", summary: "SUSE CVE CVE-2016-2181 page", url: "https://www.suse.com/security/cve/CVE-2016-2181/", }, { category: "self", summary: "SUSE CVE CVE-2016-2182 page", url: "https://www.suse.com/security/cve/CVE-2016-2182/", }, { category: "self", summary: "SUSE CVE CVE-2016-2183 page", url: "https://www.suse.com/security/cve/CVE-2016-2183/", }, { category: "self", summary: "SUSE CVE CVE-2016-2381 page", url: "https://www.suse.com/security/cve/CVE-2016-2381/", }, { category: "self", summary: "SUSE CVE CVE-2016-3075 page", url: "https://www.suse.com/security/cve/CVE-2016-3075/", }, { category: "self", summary: "SUSE CVE CVE-2016-3191 page", url: "https://www.suse.com/security/cve/CVE-2016-3191/", }, { category: "self", summary: "SUSE CVE CVE-2016-3627 page", url: "https://www.suse.com/security/cve/CVE-2016-3627/", }, { category: "self", summary: "SUSE CVE CVE-2016-3705 page", url: "https://www.suse.com/security/cve/CVE-2016-3705/", }, { category: "self", summary: "SUSE CVE CVE-2016-3706 page", url: "https://www.suse.com/security/cve/CVE-2016-3706/", }, { category: "self", summary: "SUSE CVE CVE-2016-4008 page", url: "https://www.suse.com/security/cve/CVE-2016-4008/", }, { category: "self", summary: "SUSE CVE CVE-2016-4429 page", url: "https://www.suse.com/security/cve/CVE-2016-4429/", }, { category: "self", summary: "SUSE CVE CVE-2016-4447 page", url: "https://www.suse.com/security/cve/CVE-2016-4447/", }, { category: "self", summary: "SUSE CVE CVE-2016-4448 page", url: "https://www.suse.com/security/cve/CVE-2016-4448/", }, { category: "self", summary: "SUSE CVE CVE-2016-4449 page", url: "https://www.suse.com/security/cve/CVE-2016-4449/", }, { category: "self", summary: "SUSE CVE CVE-2016-4483 page", url: "https://www.suse.com/security/cve/CVE-2016-4483/", }, { category: "self", summary: "SUSE CVE CVE-2016-4574 page", url: "https://www.suse.com/security/cve/CVE-2016-4574/", }, { category: "self", summary: "SUSE CVE CVE-2016-4579 page", url: "https://www.suse.com/security/cve/CVE-2016-4579/", }, { category: "self", summary: "SUSE CVE CVE-2016-4658 page", url: "https://www.suse.com/security/cve/CVE-2016-4658/", }, { category: "self", summary: "SUSE CVE CVE-2016-5011 page", url: "https://www.suse.com/security/cve/CVE-2016-5011/", }, { category: "self", summary: "SUSE CVE CVE-2016-5300 page", url: "https://www.suse.com/security/cve/CVE-2016-5300/", }, { category: "self", summary: "SUSE CVE CVE-2016-5419 page", url: "https://www.suse.com/security/cve/CVE-2016-5419/", }, { category: "self", summary: "SUSE CVE CVE-2016-5420 page", url: "https://www.suse.com/security/cve/CVE-2016-5420/", }, { category: "self", summary: "SUSE CVE CVE-2016-5421 page", url: "https://www.suse.com/security/cve/CVE-2016-5421/", }, { category: "self", summary: "SUSE CVE CVE-2016-6185 page", url: "https://www.suse.com/security/cve/CVE-2016-6185/", }, { category: "self", summary: "SUSE CVE CVE-2016-6261 page", url: "https://www.suse.com/security/cve/CVE-2016-6261/", }, { category: "self", summary: "SUSE CVE CVE-2016-6262 page", url: "https://www.suse.com/security/cve/CVE-2016-6262/", }, { category: "self", summary: "SUSE CVE CVE-2016-6263 page", url: "https://www.suse.com/security/cve/CVE-2016-6263/", }, { category: "self", summary: "SUSE CVE CVE-2016-6302 page", url: "https://www.suse.com/security/cve/CVE-2016-6302/", }, { category: "self", summary: "SUSE CVE CVE-2016-6303 page", url: "https://www.suse.com/security/cve/CVE-2016-6303/", }, { category: "self", summary: "SUSE CVE CVE-2016-6304 page", url: "https://www.suse.com/security/cve/CVE-2016-6304/", }, { category: "self", summary: "SUSE CVE CVE-2016-6306 page", url: "https://www.suse.com/security/cve/CVE-2016-6306/", }, { category: "self", summary: "SUSE CVE CVE-2016-6313 page", url: "https://www.suse.com/security/cve/CVE-2016-6313/", }, { category: "self", summary: "SUSE CVE CVE-2016-6318 page", url: "https://www.suse.com/security/cve/CVE-2016-6318/", }, { category: "self", summary: "SUSE CVE CVE-2016-7141 page", url: "https://www.suse.com/security/cve/CVE-2016-7141/", }, { category: "self", summary: "SUSE CVE CVE-2016-7167 page", url: "https://www.suse.com/security/cve/CVE-2016-7167/", }, { category: "self", summary: "SUSE CVE CVE-2016-7543 page", url: "https://www.suse.com/security/cve/CVE-2016-7543/", }, { category: "self", summary: "SUSE CVE CVE-2016-7796 page", url: "https://www.suse.com/security/cve/CVE-2016-7796/", }, { category: "self", summary: "SUSE CVE CVE-2016-8615 page", url: "https://www.suse.com/security/cve/CVE-2016-8615/", }, { category: "self", summary: "SUSE CVE CVE-2016-8616 page", url: "https://www.suse.com/security/cve/CVE-2016-8616/", }, { category: "self", summary: "SUSE CVE CVE-2016-8617 page", url: "https://www.suse.com/security/cve/CVE-2016-8617/", }, { category: "self", summary: "SUSE CVE CVE-2016-8618 page", url: "https://www.suse.com/security/cve/CVE-2016-8618/", }, { category: "self", summary: "SUSE CVE CVE-2016-8619 page", url: "https://www.suse.com/security/cve/CVE-2016-8619/", }, { category: "self", summary: "SUSE CVE CVE-2016-8620 page", url: "https://www.suse.com/security/cve/CVE-2016-8620/", }, { category: "self", summary: "SUSE CVE CVE-2016-8621 page", url: "https://www.suse.com/security/cve/CVE-2016-8621/", }, { category: "self", summary: "SUSE CVE CVE-2016-8622 page", url: "https://www.suse.com/security/cve/CVE-2016-8622/", }, { category: "self", summary: "SUSE CVE CVE-2016-8623 page", url: "https://www.suse.com/security/cve/CVE-2016-8623/", }, { category: "self", summary: "SUSE CVE CVE-2016-8624 page", url: "https://www.suse.com/security/cve/CVE-2016-8624/", }, { category: "self", summary: "SUSE CVE CVE-2016-9063 page", url: "https://www.suse.com/security/cve/CVE-2016-9063/", }, { category: "self", summary: "SUSE CVE CVE-2016-9318 page", url: "https://www.suse.com/security/cve/CVE-2016-9318/", }, { category: "self", summary: "SUSE CVE CVE-2016-9586 page", url: "https://www.suse.com/security/cve/CVE-2016-9586/", }, { category: "self", summary: "SUSE CVE CVE-2016-9597 page", url: "https://www.suse.com/security/cve/CVE-2016-9597/", }, { category: "self", summary: "SUSE CVE CVE-2016-9840 page", url: "https://www.suse.com/security/cve/CVE-2016-9840/", }, { category: "self", summary: "SUSE CVE CVE-2016-9841 page", url: "https://www.suse.com/security/cve/CVE-2016-9841/", }, { category: "self", summary: "SUSE CVE CVE-2016-9842 page", url: "https://www.suse.com/security/cve/CVE-2016-9842/", }, { category: "self", summary: "SUSE CVE CVE-2016-9843 page", url: "https://www.suse.com/security/cve/CVE-2016-9843/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000100 page", url: "https://www.suse.com/security/cve/CVE-2017-1000100/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000101 page", url: "https://www.suse.com/security/cve/CVE-2017-1000101/", }, { category: "self", summary: "SUSE CVE CVE-2017-1000366 page", url: "https://www.suse.com/security/cve/CVE-2017-1000366/", }, { category: "self", summary: "SUSE CVE CVE-2017-10684 page", url: "https://www.suse.com/security/cve/CVE-2017-10684/", }, { category: "self", summary: "SUSE CVE CVE-2017-10685 page", url: "https://www.suse.com/security/cve/CVE-2017-10685/", }, { category: "self", summary: "SUSE CVE CVE-2017-11112 page", url: "https://www.suse.com/security/cve/CVE-2017-11112/", }, { category: "self", summary: "SUSE CVE CVE-2017-11113 page", url: "https://www.suse.com/security/cve/CVE-2017-11113/", }, { category: "self", summary: "SUSE CVE CVE-2017-2616 page", url: "https://www.suse.com/security/cve/CVE-2017-2616/", }, { category: "self", summary: "SUSE CVE CVE-2017-6507 page", url: "https://www.suse.com/security/cve/CVE-2017-6507/", }, { category: "self", summary: "SUSE CVE CVE-2017-7407 page", url: "https://www.suse.com/security/cve/CVE-2017-7407/", }, { category: "self", summary: "SUSE CVE CVE-2017-7526 page", url: "https://www.suse.com/security/cve/CVE-2017-7526/", }, { category: "self", summary: "SUSE CVE CVE-2017-9047 page", url: "https://www.suse.com/security/cve/CVE-2017-9047/", }, { category: "self", summary: "SUSE CVE CVE-2017-9048 page", url: "https://www.suse.com/security/cve/CVE-2017-9048/", }, { category: "self", summary: "SUSE CVE CVE-2017-9049 page", url: "https://www.suse.com/security/cve/CVE-2017-9049/", }, { category: "self", summary: "SUSE CVE CVE-2017-9050 page", url: "https://www.suse.com/security/cve/CVE-2017-9050/", }, { category: "self", summary: "SUSE CVE CVE-2017-9233 page", url: "https://www.suse.com/security/cve/CVE-2017-9233/", }, ], title: "Security update for SLES 12 Docker image", tracking: { current_release_date: "2017-10-10T19:37:24Z", generator: { date: "2017-10-10T19:37:24Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2017:2699-1", initial_release_date: "2017-10-10T19:37:24Z", revision_history: [ { date: "2017-10-10T19:37:24Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "sles12-docker-image-1.1.4-20171002.ppc64le", product: { name: "sles12-docker-image-1.1.4-20171002.ppc64le", product_id: "sles12-docker-image-1.1.4-20171002.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "sles12-docker-image-1.1.4-20171002.s390x", product: { name: "sles12-docker-image-1.1.4-20171002.s390x", product_id: "sles12-docker-image-1.1.4-20171002.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "sles12-docker-image-1.1.4-20171002.x86_64", product: { name: "sles12-docker-image-1.1.4-20171002.x86_64", product_id: "sles12-docker-image-1.1.4-20171002.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Containers 12", product: { name: "SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-containers:12", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "sles12-docker-image-1.1.4-20171002.ppc64le as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", }, product_reference: "sles12-docker-image-1.1.4-20171002.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "sles12-docker-image-1.1.4-20171002.s390x as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", }, product_reference: "sles12-docker-image-1.1.4-20171002.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, { category: "default_component_of", full_product_name: { name: "sles12-docker-image-1.1.4-20171002.x86_64 as component of SUSE Linux Enterprise Module for Containers 12", product_id: "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", }, product_reference: "sles12-docker-image-1.1.4-20171002.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Containers 12", }, ], }, vulnerabilities: [ { cve: "CVE-2012-6702", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-6702", }, ], notes: [ { category: "general", text: "Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-6702", url: "https://www.suse.com/security/cve/CVE-2012-6702", }, { category: "external", summary: "SUSE Bug 983215 for CVE-2012-6702", url: "https://bugzilla.suse.com/983215", }, { category: "external", summary: "SUSE Bug 983216 for CVE-2012-6702", url: "https://bugzilla.suse.com/983216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2012-6702", }, { cve: "CVE-2014-0191", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-0191", }, ], notes: [ { category: "general", text: "The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-0191", url: "https://www.suse.com/security/cve/CVE-2014-0191", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2014-0191", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2014-0191", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 876652 for CVE-2014-0191", url: "https://bugzilla.suse.com/876652", }, { category: "external", summary: "SUSE Bug 877506 for CVE-2014-0191", url: "https://bugzilla.suse.com/877506", }, { category: "external", summary: "SUSE Bug 996079 for CVE-2014-0191", url: "https://bugzilla.suse.com/996079", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2014-0191", }, { cve: "CVE-2014-6271", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6271", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6271", url: "https://www.suse.com/security/cve/CVE-2014-6271", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-6271", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 1130324 for CVE-2014-6271", url: "https://bugzilla.suse.com/1130324", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2014-6271", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 896776 for CVE-2014-6271", url: "https://bugzilla.suse.com/896776", }, { category: "external", summary: "SUSE Bug 898346 for CVE-2014-6271", url: "https://bugzilla.suse.com/898346", }, { category: "external", summary: "SUSE Bug 898604 for CVE-2014-6271", url: "https://bugzilla.suse.com/898604", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6271", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6271", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6271", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-6271", url: "https://bugzilla.suse.com/900454", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2014-6271", }, { cve: "CVE-2014-6277", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6277", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6277", url: "https://www.suse.com/security/cve/CVE-2014-6277", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6277", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6277", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6277", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-6277", url: "https://bugzilla.suse.com/900454", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2014-6277", }, { cve: "CVE-2014-6278", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-6278", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-6278", url: "https://www.suse.com/security/cve/CVE-2014-6278", }, { category: "external", summary: "SUSE Bug 898604 for CVE-2014-6278", url: "https://bugzilla.suse.com/898604", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-6278", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-6278", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-6278", url: "https://bugzilla.suse.com/900127", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2014-6278", }, { cve: "CVE-2014-7169", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7169", }, ], notes: [ { category: "general", text: "GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7169", url: "https://www.suse.com/security/cve/CVE-2014-7169", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-7169", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 1130324 for CVE-2014-7169", url: "https://bugzilla.suse.com/1130324", }, { category: "external", summary: "SUSE Bug 870618 for CVE-2014-7169", url: "https://bugzilla.suse.com/870618", }, { category: "external", summary: "SUSE Bug 896776 for CVE-2014-7169", url: "https://bugzilla.suse.com/896776", }, { category: "external", summary: "SUSE Bug 898346 for CVE-2014-7169", url: "https://bugzilla.suse.com/898346", }, { category: "external", summary: "SUSE Bug 898762 for CVE-2014-7169", url: "https://bugzilla.suse.com/898762", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-7169", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-7169", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 899039 for CVE-2014-7169", url: "https://bugzilla.suse.com/899039", }, { category: "external", summary: "SUSE Bug 899266 for CVE-2014-7169", url: "https://bugzilla.suse.com/899266", }, { category: "external", summary: "SUSE Bug 900127 for CVE-2014-7169", url: "https://bugzilla.suse.com/900127", }, { category: "external", summary: "SUSE Bug 900454 for CVE-2014-7169", url: "https://bugzilla.suse.com/900454", }, { category: "external", summary: "SUSE Bug 902237 for CVE-2014-7169", url: "https://bugzilla.suse.com/902237", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2014-7169", }, { cve: "CVE-2014-7187", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7187", }, ], notes: [ { category: "general", text: "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7187", url: "https://www.suse.com/security/cve/CVE-2014-7187", }, { category: "external", summary: "SUSE Bug 1024628 for CVE-2014-7187", url: "https://bugzilla.suse.com/1024628", }, { category: "external", summary: "SUSE Bug 898603 for CVE-2014-7187", url: "https://bugzilla.suse.com/898603", }, { category: "external", summary: "SUSE Bug 898812 for CVE-2014-7187", url: "https://bugzilla.suse.com/898812", }, { category: "external", summary: "SUSE Bug 898884 for CVE-2014-7187", url: "https://bugzilla.suse.com/898884", }, { category: "external", summary: "SUSE Bug 899039 for CVE-2014-7187", url: "https://bugzilla.suse.com/899039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2014-7187", }, { cve: "CVE-2014-7824", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-7824", }, ], notes: [ { category: "general", text: "D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-7824", url: "https://www.suse.com/security/cve/CVE-2014-7824", }, { category: "external", summary: "SUSE Bug 904017 for CVE-2014-7824", url: "https://bugzilla.suse.com/904017", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2014-7824", }, { cve: "CVE-2014-8964", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-8964", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-8964", url: "https://www.suse.com/security/cve/CVE-2014-8964", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2014-8964", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 924960 for CVE-2014-8964", url: "https://bugzilla.suse.com/924960", }, { category: "external", summary: "SUSE Bug 933288 for CVE-2014-8964", url: "https://bugzilla.suse.com/933288", }, { category: "external", summary: "SUSE Bug 936408 for CVE-2014-8964", url: "https://bugzilla.suse.com/936408", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2014-8964", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2014-8964", }, { cve: "CVE-2014-9770", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2014-9770", }, ], notes: [ { category: "general", text: "tmpfiles.d/systemd.conf in systemd before 214 uses weak permissions for journal files under (1) /run/log/journal/%m and (2) /var/log/journal/%m, which allows local users to obtain sensitive information by reading these files.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2014-9770", url: "https://www.suse.com/security/cve/CVE-2014-9770", }, { category: "external", summary: "SUSE Bug 972612 for CVE-2014-9770", url: "https://bugzilla.suse.com/972612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2014-9770", }, { cve: "CVE-2015-0245", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-0245", }, ], notes: [ { category: "general", text: "D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-0245", url: "https://www.suse.com/security/cve/CVE-2015-0245", }, { category: "external", summary: "SUSE Bug 1003898 for CVE-2015-0245", url: "https://bugzilla.suse.com/1003898", }, { category: "external", summary: "SUSE Bug 916343 for CVE-2015-0245", url: "https://bugzilla.suse.com/916343", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2015-0245", }, { cve: "CVE-2015-1283", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-1283", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-1283", url: "https://www.suse.com/security/cve/CVE-2015-1283", }, { category: "external", summary: "SUSE Bug 1034050 for CVE-2015-1283", url: "https://bugzilla.suse.com/1034050", }, { category: "external", summary: "SUSE Bug 939077 for CVE-2015-1283", url: "https://bugzilla.suse.com/939077", }, { category: "external", summary: "SUSE Bug 979441 for CVE-2015-1283", url: "https://bugzilla.suse.com/979441", }, { category: "external", summary: "SUSE Bug 980391 for CVE-2015-1283", url: "https://bugzilla.suse.com/980391", }, { category: "external", summary: "SUSE Bug 983985 for CVE-2015-1283", url: "https://bugzilla.suse.com/983985", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-1283", }, { cve: "CVE-2015-2059", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2059", }, ], notes: [ { category: "general", text: "The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2059", url: "https://www.suse.com/security/cve/CVE-2015-2059", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2015-2059", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 919214 for CVE-2015-2059", url: "https://bugzilla.suse.com/919214", }, { category: "external", summary: "SUSE Bug 923241 for CVE-2015-2059", url: "https://bugzilla.suse.com/923241", }, { category: "external", summary: "SUSE Bug 937096 for CVE-2015-2059", url: "https://bugzilla.suse.com/937096", }, { category: "external", summary: "SUSE Bug 937097 for CVE-2015-2059", url: "https://bugzilla.suse.com/937097", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2015-2059", }, { cve: "CVE-2015-2325", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2325", }, ], notes: [ { category: "general", text: "The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2325", url: "https://www.suse.com/security/cve/CVE-2015-2325", }, { category: "external", summary: "SUSE Bug 924960 for CVE-2015-2325", url: "https://bugzilla.suse.com/924960", }, { category: "external", summary: "SUSE Bug 933288 for CVE-2015-2325", url: "https://bugzilla.suse.com/933288", }, { category: "external", summary: "SUSE Bug 936408 for CVE-2015-2325", url: "https://bugzilla.suse.com/936408", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-2325", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-2325", }, { cve: "CVE-2015-2327", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2327", }, ], notes: [ { category: "general", text: "PCRE before 8.36 mishandles the /(((a\\2)|(a*)\\g<-1>))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2327", url: "https://www.suse.com/security/cve/CVE-2015-2327", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-2327", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957567 for CVE-2015-2327", url: "https://bugzilla.suse.com/957567", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-2327", }, { cve: "CVE-2015-2328", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-2328", }, ], notes: [ { category: "general", text: "PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-2328", url: "https://www.suse.com/security/cve/CVE-2015-2328", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-2328", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957600 for CVE-2015-2328", url: "https://bugzilla.suse.com/957600", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-2328", }, { cve: "CVE-2015-3210", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3210", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3210", url: "https://www.suse.com/security/cve/CVE-2015-3210", }, { category: "external", summary: "SUSE Bug 933288 for CVE-2015-3210", url: "https://bugzilla.suse.com/933288", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-3210", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-3210", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2015-3210", }, { cve: "CVE-2015-3217", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3217", }, ], notes: [ { category: "general", text: "PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\\\.|([^\\\\\\\\W_])?)+)+$/.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3217", url: "https://www.suse.com/security/cve/CVE-2015-3217", }, { category: "external", summary: "SUSE Bug 933878 for CVE-2015-3217", url: "https://bugzilla.suse.com/933878", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-3217", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-3217", }, { cve: "CVE-2015-3238", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3238", }, ], notes: [ { category: "general", text: "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3238", url: "https://www.suse.com/security/cve/CVE-2015-3238", }, { category: "external", summary: "SUSE Bug 1123794 for CVE-2015-3238", url: "https://bugzilla.suse.com/1123794", }, { category: "external", summary: "SUSE Bug 934920 for CVE-2015-3238", url: "https://bugzilla.suse.com/934920", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-3238", }, { cve: "CVE-2015-3622", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-3622", }, ], notes: [ { category: "general", text: "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-3622", url: "https://www.suse.com/security/cve/CVE-2015-3622", }, { category: "external", summary: "SUSE Bug 929414 for CVE-2015-3622", url: "https://bugzilla.suse.com/929414", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2015-3622", }, { cve: "CVE-2015-5073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-5073", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-5073", url: "https://www.suse.com/security/cve/CVE-2015-5073", }, { category: "external", summary: "SUSE Bug 936227 for CVE-2015-5073", url: "https://bugzilla.suse.com/936227", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-5073", }, { cve: "CVE-2015-5218", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-5218", }, ], notes: [ { category: "general", text: "Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-5218", url: "https://www.suse.com/security/cve/CVE-2015-5218", }, { category: "external", summary: "SUSE Bug 949754 for CVE-2015-5218", url: "https://bugzilla.suse.com/949754", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2015-5218", }, { cve: "CVE-2015-5276", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-5276", }, ], notes: [ { category: "general", text: "The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-5276", url: "https://www.suse.com/security/cve/CVE-2015-5276", }, { category: "external", summary: "SUSE Bug 945842 for CVE-2015-5276", url: "https://bugzilla.suse.com/945842", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-5276", }, { cve: "CVE-2015-7511", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-7511", }, ], notes: [ { category: "general", text: "Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-7511", url: "https://www.suse.com/security/cve/CVE-2015-7511", }, { category: "external", summary: "SUSE Bug 965902 for CVE-2015-7511", url: "https://bugzilla.suse.com/965902", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-7511", }, { cve: "CVE-2015-8380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8380", }, ], notes: [ { category: "general", text: "The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \\01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8380", url: "https://www.suse.com/security/cve/CVE-2015-8380", }, { category: "external", summary: "SUSE Bug 957566 for CVE-2015-8380", url: "https://bugzilla.suse.com/957566", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2015-8380", }, { cve: "CVE-2015-8381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8381", }, ], notes: [ { category: "general", text: "The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?'R')(\\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and /(?J:(?|(:(?|(?'R')(\\z(?|(?'R')(\\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8381", url: "https://www.suse.com/security/cve/CVE-2015-8381", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8381", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8381", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8381", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-8381", }, { cve: "CVE-2015-8382", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8382", }, ], notes: [ { category: "general", text: "The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8382", url: "https://www.suse.com/security/cve/CVE-2015-8382", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8382", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8382", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8382", }, { cve: "CVE-2015-8383", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8383", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8383", url: "https://www.suse.com/security/cve/CVE-2015-8383", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8383", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8383", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8383", }, { cve: "CVE-2015-8384", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8384", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8384", url: "https://www.suse.com/security/cve/CVE-2015-8384", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8384", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8384", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8384", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8384", }, { cve: "CVE-2015-8385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8385", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?|(\\k'Pm')|(?'Pm'))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8385", url: "https://www.suse.com/security/cve/CVE-2015-8385", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8385", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8385", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8385", }, { cve: "CVE-2015-8386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8386", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8386", url: "https://www.suse.com/security/cve/CVE-2015-8386", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8386", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8386", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8386", }, { cve: "CVE-2015-8387", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8387", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8387", url: "https://www.suse.com/security/cve/CVE-2015-8387", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8387", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8387", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8387", }, { cve: "CVE-2015-8388", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8388", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8388", url: "https://www.suse.com/security/cve/CVE-2015-8388", }, { category: "external", summary: "SUSE Bug 936227 for CVE-2015-8388", url: "https://bugzilla.suse.com/936227", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8388", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8388", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8388", }, { cve: "CVE-2015-8389", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8389", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8389", url: "https://www.suse.com/security/cve/CVE-2015-8389", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8389", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8389", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8389", }, { cve: "CVE-2015-8390", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8390", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the [: and \\\\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8390", url: "https://www.suse.com/security/cve/CVE-2015-8390", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8390", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8390", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8390", }, { cve: "CVE-2015-8391", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8391", }, ], notes: [ { category: "general", text: "The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8391", url: "https://www.suse.com/security/cve/CVE-2015-8391", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8391", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8391", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8391", }, { cve: "CVE-2015-8392", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8392", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles certain instances of the (?| substring, which allows remote attackers to cause a denial of service (unintended recursion and buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8395.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8392", url: "https://www.suse.com/security/cve/CVE-2015-8392", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8392", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8392", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8392", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-8392", }, { cve: "CVE-2015-8393", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8393", }, ], notes: [ { category: "general", text: "pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8393", url: "https://www.suse.com/security/cve/CVE-2015-8393", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8393", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8393", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8393", }, { cve: "CVE-2015-8394", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8394", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles the (?(<digits>) and (?(R<digits>) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8394", url: "https://www.suse.com/security/cve/CVE-2015-8394", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8394", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8394", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8394", }, { cve: "CVE-2015-8395", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8395", }, ], notes: [ { category: "general", text: "PCRE before 8.38 mishandles certain references, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8392.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8395", url: "https://www.suse.com/security/cve/CVE-2015-8395", }, { category: "external", summary: "SUSE Bug 906574 for CVE-2015-8395", url: "https://bugzilla.suse.com/906574", }, { category: "external", summary: "SUSE Bug 957598 for CVE-2015-8395", url: "https://bugzilla.suse.com/957598", }, { category: "external", summary: "SUSE Bug 958373 for CVE-2015-8395", url: "https://bugzilla.suse.com/958373", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2015-8395", }, { cve: "CVE-2015-8806", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8806", }, ], notes: [ { category: "general", text: "dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the \"<!DOCTYPE html\" substring in a crafted HTML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8806", url: "https://www.suse.com/security/cve/CVE-2015-8806", }, { category: "external", summary: "SUSE Bug 963963 for CVE-2015-8806", url: "https://bugzilla.suse.com/963963", }, { category: "external", summary: "SUSE Bug 965283 for CVE-2015-8806", url: "https://bugzilla.suse.com/965283", }, { category: "external", summary: "SUSE Bug 981114 for CVE-2015-8806", url: "https://bugzilla.suse.com/981114", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-8806", }, { cve: "CVE-2015-8842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8842", }, ], notes: [ { category: "general", text: "tmpfiles.d/systemd.conf in systemd before 229 uses weak permissions for /var/log/journal/%m/system.journal, which allows local users to obtain sensitive information by reading the file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8842", url: "https://www.suse.com/security/cve/CVE-2015-8842", }, { category: "external", summary: "SUSE Bug 972612 for CVE-2015-8842", url: "https://bugzilla.suse.com/972612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-8842", }, { cve: "CVE-2015-8853", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8853", }, ], notes: [ { category: "general", text: "The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by \"a\\x80.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8853", url: "https://www.suse.com/security/cve/CVE-2015-8853", }, { category: "external", summary: "SUSE Bug 976584 for CVE-2015-8853", url: "https://bugzilla.suse.com/976584", }, { category: "external", summary: "SUSE Bug 997948 for CVE-2015-8853", url: "https://bugzilla.suse.com/997948", }, { category: "external", summary: "SUSE Bug 997950 for CVE-2015-8853", url: "https://bugzilla.suse.com/997950", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-8853", }, { cve: "CVE-2015-8948", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2015-8948", }, ], notes: [ { category: "general", text: "idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2015-8948", url: "https://www.suse.com/security/cve/CVE-2015-8948", }, { category: "external", summary: "SUSE Bug 1014473 for CVE-2015-8948", url: "https://bugzilla.suse.com/1014473", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2015-8948", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 1190777 for CVE-2015-8948", url: "https://bugzilla.suse.com/1190777", }, { category: "external", summary: "SUSE Bug 990189 for CVE-2015-8948", url: "https://bugzilla.suse.com/990189", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2015-8948", }, { cve: "CVE-2016-0634", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0634", }, ], notes: [ { category: "general", text: "The expansion of '\\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0634", url: "https://www.suse.com/security/cve/CVE-2016-0634", }, { category: "external", summary: "SUSE Bug 1000396 for CVE-2016-0634", url: "https://bugzilla.suse.com/1000396", }, { category: "external", summary: "SUSE Bug 1001299 for CVE-2016-0634", url: "https://bugzilla.suse.com/1001299", }, { category: "external", summary: "SUSE Bug 1159416 for CVE-2016-0634", url: "https://bugzilla.suse.com/1159416", }, { category: "external", summary: "SUSE Bug 1188388 for CVE-2016-0634", url: "https://bugzilla.suse.com/1188388", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-0634", }, { cve: "CVE-2016-0718", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0718", }, ], notes: [ { category: "general", text: "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0718", url: "https://www.suse.com/security/cve/CVE-2016-0718", }, { category: "external", summary: "SUSE Bug 979441 for CVE-2016-0718", url: "https://bugzilla.suse.com/979441", }, { category: "external", summary: "SUSE Bug 991809 for CVE-2016-0718", url: "https://bugzilla.suse.com/991809", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-0718", }, { cve: "CVE-2016-0787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-0787", }, ], notes: [ { category: "general", text: "The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a \"bits/bytes confusion bug.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-0787", url: "https://www.suse.com/security/cve/CVE-2016-0787", }, { category: "external", summary: "SUSE Bug 1149968 for CVE-2016-0787", url: "https://bugzilla.suse.com/1149968", }, { category: "external", summary: "SUSE Bug 967026 for CVE-2016-0787", url: "https://bugzilla.suse.com/967026", }, { category: "external", summary: "SUSE Bug 968174 for CVE-2016-0787", url: "https://bugzilla.suse.com/968174", }, { category: "external", summary: "SUSE Bug 974691 for CVE-2016-0787", url: "https://bugzilla.suse.com/974691", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-0787", }, { cve: "CVE-2016-1234", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1234", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1234", url: "https://www.suse.com/security/cve/CVE-2016-1234", }, { category: "external", summary: "SUSE Bug 1020940 for CVE-2016-1234", url: "https://bugzilla.suse.com/1020940", }, { category: "external", summary: "SUSE Bug 969727 for CVE-2016-1234", url: "https://bugzilla.suse.com/969727", }, { category: "external", summary: "SUSE Bug 988770 for CVE-2016-1234", url: "https://bugzilla.suse.com/988770", }, { category: "external", summary: "SUSE Bug 988782 for CVE-2016-1234", url: "https://bugzilla.suse.com/988782", }, { category: "external", summary: "SUSE Bug 989127 for CVE-2016-1234", url: "https://bugzilla.suse.com/989127", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-1234", }, { cve: "CVE-2016-1238", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1238", }, ], notes: [ { category: "general", text: "(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1238", url: "https://www.suse.com/security/cve/CVE-2016-1238", }, { category: "external", summary: "SUSE Bug 1108749 for CVE-2016-1238", url: "https://bugzilla.suse.com/1108749", }, { category: "external", summary: "SUSE Bug 1123389 for CVE-2016-1238", url: "https://bugzilla.suse.com/1123389", }, { category: "external", summary: "SUSE Bug 987887 for CVE-2016-1238", url: "https://bugzilla.suse.com/987887", }, { category: "external", summary: "SUSE Bug 988311 for CVE-2016-1238", url: "https://bugzilla.suse.com/988311", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-1238", }, { cve: "CVE-2016-1283", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1283", }, ], notes: [ { category: "general", text: "The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\\\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\\){97)?J)?J)(?'R'(?'R'\\){99|(:(?|(?'R')(\\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1283", url: "https://www.suse.com/security/cve/CVE-2016-1283", }, { category: "external", summary: "SUSE Bug 960837 for CVE-2016-1283", url: "https://bugzilla.suse.com/960837", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2016-1283", }, { cve: "CVE-2016-1762", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1762", }, ], notes: [ { category: "general", text: "The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1762", url: "https://www.suse.com/security/cve/CVE-2016-1762", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1762", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981040 for CVE-2016-1762", url: "https://bugzilla.suse.com/981040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-1762", }, { cve: "CVE-2016-1833", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1833", }, ], notes: [ { category: "general", text: "The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1833", url: "https://www.suse.com/security/cve/CVE-2016-1833", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1833", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981108 for CVE-2016-1833", url: "https://bugzilla.suse.com/981108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-1833", }, { cve: "CVE-2016-1834", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1834", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1834", url: "https://www.suse.com/security/cve/CVE-2016-1834", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1834", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981041 for CVE-2016-1834", url: "https://bugzilla.suse.com/981041", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-1834", }, { cve: "CVE-2016-1835", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1835", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1835", url: "https://www.suse.com/security/cve/CVE-2016-1835", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1835", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981109 for CVE-2016-1835", url: "https://bugzilla.suse.com/981109", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-1835", }, { cve: "CVE-2016-1837", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1837", }, ], notes: [ { category: "general", text: "Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1837", url: "https://www.suse.com/security/cve/CVE-2016-1837", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1837", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981111 for CVE-2016-1837", url: "https://bugzilla.suse.com/981111", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-1837", }, { cve: "CVE-2016-1838", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1838", }, ], notes: [ { category: "general", text: "The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1838", url: "https://www.suse.com/security/cve/CVE-2016-1838", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1838", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981112 for CVE-2016-1838", url: "https://bugzilla.suse.com/981112", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-1838", }, { cve: "CVE-2016-1839", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1839", }, ], notes: [ { category: "general", text: "The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1839", url: "https://www.suse.com/security/cve/CVE-2016-1839", }, { category: "external", summary: "SUSE Bug 1039069 for CVE-2016-1839", url: "https://bugzilla.suse.com/1039069", }, { category: "external", summary: "SUSE Bug 1039661 for CVE-2016-1839", url: "https://bugzilla.suse.com/1039661", }, { category: "external", summary: "SUSE Bug 1069433 for CVE-2016-1839", url: "https://bugzilla.suse.com/1069433", }, { category: "external", summary: "SUSE Bug 1069690 for CVE-2016-1839", url: "https://bugzilla.suse.com/1069690", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1839", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 963963 for CVE-2016-1839", url: "https://bugzilla.suse.com/963963", }, { category: "external", summary: "SUSE Bug 981114 for CVE-2016-1839", url: "https://bugzilla.suse.com/981114", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-1839", }, { cve: "CVE-2016-1840", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-1840", }, ], notes: [ { category: "general", text: "Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-1840", url: "https://www.suse.com/security/cve/CVE-2016-1840", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-1840", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981115 for CVE-2016-1840", url: "https://bugzilla.suse.com/981115", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-1840", }, { cve: "CVE-2016-2037", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2037", }, ], notes: [ { category: "general", text: "The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2037", url: "https://www.suse.com/security/cve/CVE-2016-2037", }, { category: "external", summary: "SUSE Bug 1028410 for CVE-2016-2037", url: "https://bugzilla.suse.com/1028410", }, { category: "external", summary: "SUSE Bug 963448 for CVE-2016-2037", url: "https://bugzilla.suse.com/963448", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2037", }, { cve: "CVE-2016-2073", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2073", }, ], notes: [ { category: "general", text: "The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2073", url: "https://www.suse.com/security/cve/CVE-2016-2073", }, { category: "external", summary: "SUSE Bug 963963 for CVE-2016-2073", url: "https://bugzilla.suse.com/963963", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-2073", }, { cve: "CVE-2016-2105", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2105", }, ], notes: [ { category: "general", text: "Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2105", url: "https://www.suse.com/security/cve/CVE-2016-2105", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2105", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977614 for CVE-2016-2105", url: "https://bugzilla.suse.com/977614", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2105", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 989902 for CVE-2016-2105", url: "https://bugzilla.suse.com/989902", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2105", url: "https://bugzilla.suse.com/990369", }, { category: "external", summary: "SUSE Bug 990370 for CVE-2016-2105", url: "https://bugzilla.suse.com/990370", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2105", }, { cve: "CVE-2016-2106", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2106", }, ], notes: [ { category: "general", text: "Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2106", url: "https://www.suse.com/security/cve/CVE-2016-2106", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2106", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977615 for CVE-2016-2106", url: "https://bugzilla.suse.com/977615", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2106", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 979279 for CVE-2016-2106", url: "https://bugzilla.suse.com/979279", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2106", url: "https://bugzilla.suse.com/990369", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2106", }, { cve: "CVE-2016-2107", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2107", }, ], notes: [ { category: "general", text: "The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2107", url: "https://www.suse.com/security/cve/CVE-2016-2107", }, { category: "external", summary: "SUSE Bug 976942 for CVE-2016-2107", url: "https://bugzilla.suse.com/976942", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2107", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977616 for CVE-2016-2107", url: "https://bugzilla.suse.com/977616", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2107", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2107", url: "https://bugzilla.suse.com/990369", }, { category: "external", summary: "SUSE Bug 990370 for CVE-2016-2107", url: "https://bugzilla.suse.com/990370", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-2107", }, { cve: "CVE-2016-2108", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2108", }, ], notes: [ { category: "general", text: "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2108", url: "https://www.suse.com/security/cve/CVE-2016-2108", }, { category: "external", summary: "SUSE Bug 1001502 for CVE-2016-2108", url: "https://bugzilla.suse.com/1001502", }, { category: "external", summary: "SUSE Bug 1004499 for CVE-2016-2108", url: "https://bugzilla.suse.com/1004499", }, { category: "external", summary: "SUSE Bug 1005878 for CVE-2016-2108", url: "https://bugzilla.suse.com/1005878", }, { category: "external", summary: "SUSE Bug 1148697 for CVE-2016-2108", url: "https://bugzilla.suse.com/1148697", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2108", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 977617 for CVE-2016-2108", url: "https://bugzilla.suse.com/977617", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2108", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 989345 for CVE-2016-2108", url: "https://bugzilla.suse.com/989345", }, { category: "external", summary: "SUSE Bug 996067 for CVE-2016-2108", url: "https://bugzilla.suse.com/996067", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-2108", }, { cve: "CVE-2016-2109", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2109", }, ], notes: [ { category: "general", text: "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2109", url: "https://www.suse.com/security/cve/CVE-2016-2109", }, { category: "external", summary: "SUSE Bug 1015243 for CVE-2016-2109", url: "https://bugzilla.suse.com/1015243", }, { category: "external", summary: "SUSE Bug 976942 for CVE-2016-2109", url: "https://bugzilla.suse.com/976942", }, { category: "external", summary: "SUSE Bug 977584 for CVE-2016-2109", url: "https://bugzilla.suse.com/977584", }, { category: "external", summary: "SUSE Bug 978492 for CVE-2016-2109", url: "https://bugzilla.suse.com/978492", }, { category: "external", summary: "SUSE Bug 990369 for CVE-2016-2109", url: "https://bugzilla.suse.com/990369", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-2109", }, { cve: "CVE-2016-2177", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2177", }, ], notes: [ { category: "general", text: "OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2177", url: "https://www.suse.com/security/cve/CVE-2016-2177", }, { category: "external", summary: "SUSE Bug 982575 for CVE-2016-2177", url: "https://bugzilla.suse.com/982575", }, { category: "external", summary: "SUSE Bug 999075 for CVE-2016-2177", url: "https://bugzilla.suse.com/999075", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2177", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-2177", }, { cve: "CVE-2016-2178", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2178", }, ], notes: [ { category: "general", text: "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2178", url: "https://www.suse.com/security/cve/CVE-2016-2178", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2178", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 983249 for CVE-2016-2178", url: "https://bugzilla.suse.com/983249", }, { category: "external", summary: "SUSE Bug 983519 for CVE-2016-2178", url: "https://bugzilla.suse.com/983519", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2178", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2178", }, { cve: "CVE-2016-2179", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2179", }, ], notes: [ { category: "general", text: "The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2179", url: "https://www.suse.com/security/cve/CVE-2016-2179", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2179", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2179", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2179", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-2179", }, { cve: "CVE-2016-2180", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2180", }, ], notes: [ { category: "general", text: "The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the \"openssl ts\" command.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2180", url: "https://www.suse.com/security/cve/CVE-2016-2180", }, { category: "external", summary: "SUSE Bug 1003811 for CVE-2016-2180", url: "https://bugzilla.suse.com/1003811", }, { category: "external", summary: "SUSE Bug 990419 for CVE-2016-2180", url: "https://bugzilla.suse.com/990419", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2180", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2180", }, { cve: "CVE-2016-2181", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2181", }, ], notes: [ { category: "general", text: "The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2181", url: "https://www.suse.com/security/cve/CVE-2016-2181", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2181", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 994749 for CVE-2016-2181", url: "https://bugzilla.suse.com/994749", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2181", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2181", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2181", }, { cve: "CVE-2016-2182", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2182", }, ], notes: [ { category: "general", text: "The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2182", url: "https://www.suse.com/security/cve/CVE-2016-2182", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-2182", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 993819 for CVE-2016-2182", url: "https://bugzilla.suse.com/993819", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2182", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995959 for CVE-2016-2182", url: "https://bugzilla.suse.com/995959", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-2182", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-2182", }, { cve: "CVE-2016-2183", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2183", }, ], notes: [ { category: "general", text: "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2183", url: "https://www.suse.com/security/cve/CVE-2016-2183", }, { category: "external", summary: "SUSE Bug 1001912 for CVE-2016-2183", url: "https://bugzilla.suse.com/1001912", }, { category: "external", summary: "SUSE Bug 1024218 for CVE-2016-2183", url: "https://bugzilla.suse.com/1024218", }, { category: "external", summary: "SUSE Bug 1027038 for CVE-2016-2183", url: "https://bugzilla.suse.com/1027038", }, { category: "external", summary: "SUSE Bug 1034689 for CVE-2016-2183", url: "https://bugzilla.suse.com/1034689", }, { category: "external", summary: "SUSE Bug 1056614 for CVE-2016-2183", url: "https://bugzilla.suse.com/1056614", }, { category: "external", summary: "SUSE Bug 1171693 for CVE-2016-2183", url: "https://bugzilla.suse.com/1171693", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-2183", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995359 for CVE-2016-2183", url: "https://bugzilla.suse.com/995359", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-2183", }, { cve: "CVE-2016-2381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-2381", }, ], notes: [ { category: "general", text: "Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-2381", url: "https://www.suse.com/security/cve/CVE-2016-2381", }, { category: "external", summary: "SUSE Bug 967082 for CVE-2016-2381", url: "https://bugzilla.suse.com/967082", }, { category: "external", summary: "SUSE Bug 992991 for CVE-2016-2381", url: "https://bugzilla.suse.com/992991", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-2381", }, { cve: "CVE-2016-3075", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3075", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3075", url: "https://www.suse.com/security/cve/CVE-2016-3075", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2016-3075", url: "https://bugzilla.suse.com/1123874", }, { category: "external", summary: "SUSE Bug 973164 for CVE-2016-3075", url: "https://bugzilla.suse.com/973164", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-3075", }, { cve: "CVE-2016-3191", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3191", }, ], notes: [ { category: "general", text: "The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3191", url: "https://www.suse.com/security/cve/CVE-2016-3191", }, { category: "external", summary: "SUSE Bug 971741 for CVE-2016-3191", url: "https://bugzilla.suse.com/971741", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.7, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-3191", }, { cve: "CVE-2016-3627", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3627", }, ], notes: [ { category: "general", text: "The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3627", url: "https://www.suse.com/security/cve/CVE-2016-3627", }, { category: "external", summary: "SUSE Bug 1026099 for CVE-2016-3627", url: "https://bugzilla.suse.com/1026099", }, { category: "external", summary: "SUSE Bug 1026101 for CVE-2016-3627", url: "https://bugzilla.suse.com/1026101", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-3627", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 972335 for CVE-2016-3627", url: "https://bugzilla.suse.com/972335", }, { category: "external", summary: "SUSE Bug 975947 for CVE-2016-3627", url: "https://bugzilla.suse.com/975947", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-3627", }, { cve: "CVE-2016-3705", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3705", }, ], notes: [ { category: "general", text: "The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3705", url: "https://www.suse.com/security/cve/CVE-2016-3705", }, { category: "external", summary: "SUSE Bug 1017497 for CVE-2016-3705", url: "https://bugzilla.suse.com/1017497", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-3705", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 975947 for CVE-2016-3705", url: "https://bugzilla.suse.com/975947", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-3705", }, { cve: "CVE-2016-3706", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-3706", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-3706", url: "https://www.suse.com/security/cve/CVE-2016-3706", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2016-3706", url: "https://bugzilla.suse.com/1123874", }, { category: "external", summary: "SUSE Bug 980483 for CVE-2016-3706", url: "https://bugzilla.suse.com/980483", }, { category: "external", summary: "SUSE Bug 997423 for CVE-2016-3706", url: "https://bugzilla.suse.com/997423", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-3706", }, { cve: "CVE-2016-4008", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4008", }, ], notes: [ { category: "general", text: "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4008", url: "https://www.suse.com/security/cve/CVE-2016-4008", }, { category: "external", summary: "SUSE Bug 982779 for CVE-2016-4008", url: "https://bugzilla.suse.com/982779", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-4008", }, { cve: "CVE-2016-4429", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4429", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4429", url: "https://www.suse.com/security/cve/CVE-2016-4429", }, { category: "external", summary: "SUSE Bug 1081556 for CVE-2016-4429", url: "https://bugzilla.suse.com/1081556", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2016-4429", url: "https://bugzilla.suse.com/1123874", }, { category: "external", summary: "SUSE Bug 980854 for CVE-2016-4429", url: "https://bugzilla.suse.com/980854", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-4429", }, { cve: "CVE-2016-4447", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4447", }, ], notes: [ { category: "general", text: "The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4447", url: "https://www.suse.com/security/cve/CVE-2016-4447", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4447", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981548 for CVE-2016-4447", url: "https://bugzilla.suse.com/981548", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-4447", }, { cve: "CVE-2016-4448", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4448", }, ], notes: [ { category: "general", text: "Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4448", url: "https://www.suse.com/security/cve/CVE-2016-4448", }, { category: "external", summary: "SUSE Bug 1010299 for CVE-2016-4448", url: "https://bugzilla.suse.com/1010299", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4448", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981549 for CVE-2016-4448", url: "https://bugzilla.suse.com/981549", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-4448", }, { cve: "CVE-2016-4449", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4449", }, ], notes: [ { category: "general", text: "XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4449", url: "https://www.suse.com/security/cve/CVE-2016-4449", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4449", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 981550 for CVE-2016-4449", url: "https://bugzilla.suse.com/981550", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-4449", }, { cve: "CVE-2016-4483", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4483", }, ], notes: [ { category: "general", text: "The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4483", url: "https://www.suse.com/security/cve/CVE-2016-4483", }, { category: "external", summary: "SUSE Bug 1026101 for CVE-2016-4483", url: "https://bugzilla.suse.com/1026101", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4483", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 978395 for CVE-2016-4483", url: "https://bugzilla.suse.com/978395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-4483", }, { cve: "CVE-2016-4574", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4574", }, ], notes: [ { category: "general", text: "Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4574", url: "https://www.suse.com/security/cve/CVE-2016-4574", }, { category: "external", summary: "SUSE Bug 1135436 for CVE-2016-4574", url: "https://bugzilla.suse.com/1135436", }, { category: "external", summary: "SUSE Bug 979261 for CVE-2016-4574", url: "https://bugzilla.suse.com/979261", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-4574", }, { cve: "CVE-2016-4579", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4579", }, ], notes: [ { category: "general", text: "Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the \"returned length of the object from _ksba_ber_parse_tl.\"", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4579", url: "https://www.suse.com/security/cve/CVE-2016-4579", }, { category: "external", summary: "SUSE Bug 1135436 for CVE-2016-4579", url: "https://bugzilla.suse.com/1135436", }, { category: "external", summary: "SUSE Bug 979906 for CVE-2016-4579", url: "https://bugzilla.suse.com/979906", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-4579", }, { cve: "CVE-2016-4658", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-4658", }, ], notes: [ { category: "general", text: "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-4658", url: "https://www.suse.com/security/cve/CVE-2016-4658", }, { category: "external", summary: "SUSE Bug 1005544 for CVE-2016-4658", url: "https://bugzilla.suse.com/1005544", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2016-4658", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1069433 for CVE-2016-4658", url: "https://bugzilla.suse.com/1069433", }, { category: "external", summary: "SUSE Bug 1078813 for CVE-2016-4658", url: "https://bugzilla.suse.com/1078813", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-4658", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-4658", }, { cve: "CVE-2016-5011", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5011", }, ], notes: [ { category: "general", text: "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5011", url: "https://www.suse.com/security/cve/CVE-2016-5011", }, { category: "external", summary: "SUSE Bug 988361 for CVE-2016-5011", url: "https://bugzilla.suse.com/988361", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-5011", }, { cve: "CVE-2016-5300", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5300", }, ], notes: [ { category: "general", text: "The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5300", url: "https://www.suse.com/security/cve/CVE-2016-5300", }, { category: "external", summary: "SUSE Bug 983216 for CVE-2016-5300", url: "https://bugzilla.suse.com/983216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2016-5300", }, { cve: "CVE-2016-5419", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5419", }, ], notes: [ { category: "general", text: "curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5419", url: "https://www.suse.com/security/cve/CVE-2016-5419", }, { category: "external", summary: "SUSE Bug 1033413 for CVE-2016-5419", url: "https://bugzilla.suse.com/1033413", }, { category: "external", summary: "SUSE Bug 1033442 for CVE-2016-5419", url: "https://bugzilla.suse.com/1033442", }, { category: "external", summary: "SUSE Bug 991389 for CVE-2016-5419", url: "https://bugzilla.suse.com/991389", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-5419", }, { cve: "CVE-2016-5420", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5420", }, ], notes: [ { category: "general", text: "curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5420", url: "https://www.suse.com/security/cve/CVE-2016-5420", }, { category: "external", summary: "SUSE Bug 991390 for CVE-2016-5420", url: "https://bugzilla.suse.com/991390", }, { category: "external", summary: "SUSE Bug 997420 for CVE-2016-5420", url: "https://bugzilla.suse.com/997420", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-5420", }, { cve: "CVE-2016-5421", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-5421", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-5421", url: "https://www.suse.com/security/cve/CVE-2016-5421", }, { category: "external", summary: "SUSE Bug 991391 for CVE-2016-5421", url: "https://bugzilla.suse.com/991391", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-5421", }, { cve: "CVE-2016-6185", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6185", }, ], notes: [ { category: "general", text: "The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6185", url: "https://www.suse.com/security/cve/CVE-2016-6185", }, { category: "external", summary: "SUSE Bug 988311 for CVE-2016-6185", url: "https://bugzilla.suse.com/988311", }, { category: "external", summary: "SUSE Bug 999993 for CVE-2016-6185", url: "https://bugzilla.suse.com/999993", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-6185", }, { cve: "CVE-2016-6261", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6261", }, ], notes: [ { category: "general", text: "The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6261", url: "https://www.suse.com/security/cve/CVE-2016-6261", }, { category: "external", summary: "SUSE Bug 1118435 for CVE-2016-6261", url: "https://bugzilla.suse.com/1118435", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2016-6261", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 990190 for CVE-2016-6261", url: "https://bugzilla.suse.com/990190", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-6261", }, { cve: "CVE-2016-6262", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6262", }, ], notes: [ { category: "general", text: "idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6262", url: "https://www.suse.com/security/cve/CVE-2016-6262", }, { category: "external", summary: "SUSE Bug 1014473 for CVE-2016-6262", url: "https://bugzilla.suse.com/1014473", }, { category: "external", summary: "SUSE Bug 1173590 for CVE-2016-6262", url: "https://bugzilla.suse.com/1173590", }, { category: "external", summary: "SUSE Bug 1190777 for CVE-2016-6262", url: "https://bugzilla.suse.com/1190777", }, { category: "external", summary: "SUSE Bug 990189 for CVE-2016-6262", url: "https://bugzilla.suse.com/990189", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-6262", }, { cve: "CVE-2016-6263", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6263", }, ], notes: [ { category: "general", text: "The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6263", url: "https://www.suse.com/security/cve/CVE-2016-6263", }, { category: "external", summary: "SUSE Bug 1118435 for CVE-2016-6263", url: "https://bugzilla.suse.com/1118435", }, { category: "external", summary: "SUSE Bug 990191 for CVE-2016-6263", url: "https://bugzilla.suse.com/990191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-6263", }, { cve: "CVE-2016-6302", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6302", }, ], notes: [ { category: "general", text: "The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6302", url: "https://www.suse.com/security/cve/CVE-2016-6302", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6302", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-6302", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995324 for CVE-2016-6302", url: "https://bugzilla.suse.com/995324", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6302", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-6302", }, { cve: "CVE-2016-6303", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6303", }, ], notes: [ { category: "general", text: "Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6303", url: "https://www.suse.com/security/cve/CVE-2016-6303", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6303", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 1115893 for CVE-2016-6303", url: "https://bugzilla.suse.com/1115893", }, { category: "external", summary: "SUSE Bug 994844 for CVE-2016-6303", url: "https://bugzilla.suse.com/994844", }, { category: "external", summary: "SUSE Bug 995377 for CVE-2016-6303", url: "https://bugzilla.suse.com/995377", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6303", url: "https://bugzilla.suse.com/999665", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-6303", }, { cve: "CVE-2016-6304", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6304", }, ], notes: [ { category: "general", text: "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6304", url: "https://www.suse.com/security/cve/CVE-2016-6304", }, { category: "external", summary: "SUSE Bug 1001706 for CVE-2016-6304", url: "https://bugzilla.suse.com/1001706", }, { category: "external", summary: "SUSE Bug 1003811 for CVE-2016-6304", url: "https://bugzilla.suse.com/1003811", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6304", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 1005579 for CVE-2016-6304", url: "https://bugzilla.suse.com/1005579", }, { category: "external", summary: "SUSE Bug 1021375 for CVE-2016-6304", url: "https://bugzilla.suse.com/1021375", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6304", url: "https://bugzilla.suse.com/999665", }, { category: "external", summary: "SUSE Bug 999666 for CVE-2016-6304", url: "https://bugzilla.suse.com/999666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-6304", }, { cve: "CVE-2016-6306", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6306", }, ], notes: [ { category: "general", text: "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6306", url: "https://www.suse.com/security/cve/CVE-2016-6306", }, { category: "external", summary: "SUSE Bug 1004104 for CVE-2016-6306", url: "https://bugzilla.suse.com/1004104", }, { category: "external", summary: "SUSE Bug 999665 for CVE-2016-6306", url: "https://bugzilla.suse.com/999665", }, { category: "external", summary: "SUSE Bug 999668 for CVE-2016-6306", url: "https://bugzilla.suse.com/999668", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-6306", }, { cve: "CVE-2016-6313", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6313", }, ], notes: [ { category: "general", text: "The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6313", url: "https://www.suse.com/security/cve/CVE-2016-6313", }, { category: "external", summary: "SUSE Bug 1123792 for CVE-2016-6313", url: "https://bugzilla.suse.com/1123792", }, { category: "external", summary: "SUSE Bug 994157 for CVE-2016-6313", url: "https://bugzilla.suse.com/994157", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-6313", }, { cve: "CVE-2016-6318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-6318", }, ], notes: [ { category: "general", text: "Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-6318", url: "https://www.suse.com/security/cve/CVE-2016-6318", }, { category: "external", summary: "SUSE Bug 1123113 for CVE-2016-6318", url: "https://bugzilla.suse.com/1123113", }, { category: "external", summary: "SUSE Bug 992966 for CVE-2016-6318", url: "https://bugzilla.suse.com/992966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-6318", }, { cve: "CVE-2016-7141", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7141", }, ], notes: [ { category: "general", text: "curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7141", url: "https://www.suse.com/security/cve/CVE-2016-7141", }, { category: "external", summary: "SUSE Bug 991390 for CVE-2016-7141", url: "https://bugzilla.suse.com/991390", }, { category: "external", summary: "SUSE Bug 997420 for CVE-2016-7141", url: "https://bugzilla.suse.com/997420", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-7141", }, { cve: "CVE-2016-7167", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7167", }, ], notes: [ { category: "general", text: "Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7167", url: "https://www.suse.com/security/cve/CVE-2016-7167", }, { category: "external", summary: "SUSE Bug 998760 for CVE-2016-7167", url: "https://bugzilla.suse.com/998760", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-7167", }, { cve: "CVE-2016-7543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7543", }, ], notes: [ { category: "general", text: "Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7543", url: "https://www.suse.com/security/cve/CVE-2016-7543", }, { category: "external", summary: "SUSE Bug 1001299 for CVE-2016-7543", url: "https://bugzilla.suse.com/1001299", }, { category: "external", summary: "SUSE Bug 1159416 for CVE-2016-7543", url: "https://bugzilla.suse.com/1159416", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-7543", }, { cve: "CVE-2016-7796", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-7796", }, ], notes: [ { category: "general", text: "The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-7796", url: "https://www.suse.com/security/cve/CVE-2016-7796", }, { category: "external", summary: "SUSE Bug 1001765 for CVE-2016-7796", url: "https://bugzilla.suse.com/1001765", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-7796", }, { cve: "CVE-2016-8615", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8615", }, ], notes: [ { category: "general", text: "A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8615", url: "https://www.suse.com/security/cve/CVE-2016-8615", }, { category: "external", summary: "SUSE Bug 1005633 for CVE-2016-8615", url: "https://bugzilla.suse.com/1005633", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-8615", }, { cve: "CVE-2016-8616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8616", }, ], notes: [ { category: "general", text: "A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8616", url: "https://www.suse.com/security/cve/CVE-2016-8616", }, { category: "external", summary: "SUSE Bug 1005634 for CVE-2016-8616", url: "https://bugzilla.suse.com/1005634", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-8616", }, { cve: "CVE-2016-8617", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8617", }, ], notes: [ { category: "general", text: "The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8617", url: "https://www.suse.com/security/cve/CVE-2016-8617", }, { category: "external", summary: "SUSE Bug 1005635 for CVE-2016-8617", url: "https://bugzilla.suse.com/1005635", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-8617", }, { cve: "CVE-2016-8618", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8618", }, ], notes: [ { category: "general", text: "The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8618", url: "https://www.suse.com/security/cve/CVE-2016-8618", }, { category: "external", summary: "SUSE Bug 1005637 for CVE-2016-8618", url: "https://bugzilla.suse.com/1005637", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-8618", }, { cve: "CVE-2016-8619", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8619", }, ], notes: [ { category: "general", text: "The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8619", url: "https://www.suse.com/security/cve/CVE-2016-8619", }, { category: "external", summary: "SUSE Bug 1005638 for CVE-2016-8619", url: "https://bugzilla.suse.com/1005638", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-8619", }, { cve: "CVE-2016-8620", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8620", }, ], notes: [ { category: "general", text: "The 'globbing' feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8620", url: "https://www.suse.com/security/cve/CVE-2016-8620", }, { category: "external", summary: "SUSE Bug 1005640 for CVE-2016-8620", url: "https://bugzilla.suse.com/1005640", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-8620", }, { cve: "CVE-2016-8621", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8621", }, ], notes: [ { category: "general", text: "The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8621", url: "https://www.suse.com/security/cve/CVE-2016-8621", }, { category: "external", summary: "SUSE Bug 1005642 for CVE-2016-8621", url: "https://bugzilla.suse.com/1005642", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-8621", }, { cve: "CVE-2016-8622", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8622", }, ], notes: [ { category: "general", text: "The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8622", url: "https://www.suse.com/security/cve/CVE-2016-8622", }, { category: "external", summary: "SUSE Bug 1005643 for CVE-2016-8622", url: "https://bugzilla.suse.com/1005643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-8622", }, { cve: "CVE-2016-8623", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8623", }, ], notes: [ { category: "general", text: "A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8623", url: "https://www.suse.com/security/cve/CVE-2016-8623", }, { category: "external", summary: "SUSE Bug 1005645 for CVE-2016-8623", url: "https://bugzilla.suse.com/1005645", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2016-8623", }, { cve: "CVE-2016-8624", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-8624", }, ], notes: [ { category: "general", text: "curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-8624", url: "https://www.suse.com/security/cve/CVE-2016-8624", }, { category: "external", summary: "SUSE Bug 1005646 for CVE-2016-8624", url: "https://bugzilla.suse.com/1005646", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-8624", }, { cve: "CVE-2016-9063", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9063", }, ], notes: [ { category: "general", text: "An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9063", url: "https://www.suse.com/security/cve/CVE-2016-9063", }, { category: "external", summary: "SUSE Bug 1009026 for CVE-2016-9063", url: "https://bugzilla.suse.com/1009026", }, { category: "external", summary: "SUSE Bug 1010424 for CVE-2016-9063", url: "https://bugzilla.suse.com/1010424", }, { category: "external", summary: "SUSE Bug 1047240 for CVE-2016-9063", url: "https://bugzilla.suse.com/1047240", }, { category: "external", summary: "SUSE Bug 1123115 for CVE-2016-9063", url: "https://bugzilla.suse.com/1123115", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "critical", }, ], title: "CVE-2016-9063", }, { cve: "CVE-2016-9318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9318", }, ], notes: [ { category: "general", text: "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9318", url: "https://www.suse.com/security/cve/CVE-2016-9318", }, { category: "external", summary: "SUSE Bug 1010675 for CVE-2016-9318", url: "https://bugzilla.suse.com/1010675", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2016-9318", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1019074 for CVE-2016-9318", url: "https://bugzilla.suse.com/1019074", }, { category: "external", summary: "SUSE Bug 1118959 for CVE-2016-9318", url: "https://bugzilla.suse.com/1118959", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-9318", url: "https://bugzilla.suse.com/1123919", }, { category: "external", summary: "SUSE Bug 1126613 for CVE-2016-9318", url: "https://bugzilla.suse.com/1126613", }, { category: "external", summary: "SUSE Bug 1148896 for CVE-2016-9318", url: "https://bugzilla.suse.com/1148896", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9318", }, { cve: "CVE-2016-9586", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9586", }, ], notes: [ { category: "general", text: "curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9586", url: "https://www.suse.com/security/cve/CVE-2016-9586", }, { category: "external", summary: "SUSE Bug 1015332 for CVE-2016-9586", url: "https://bugzilla.suse.com/1015332", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9586", }, { cve: "CVE-2016-9597", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9597", }, ], notes: [ { category: "general", text: "It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression CVE for the same issue as CVE-2016-3705.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9597", url: "https://www.suse.com/security/cve/CVE-2016-9597", }, { category: "external", summary: "SUSE Bug 1014873 for CVE-2016-9597", url: "https://bugzilla.suse.com/1014873", }, { category: "external", summary: "SUSE Bug 1017497 for CVE-2016-9597", url: "https://bugzilla.suse.com/1017497", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2016-9597", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9597", }, { cve: "CVE-2016-9840", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9840", }, ], notes: [ { category: "general", text: "inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9840", url: "https://www.suse.com/security/cve/CVE-2016-9840", }, { category: "external", summary: "SUSE Bug 1003579 for CVE-2016-9840", url: "https://bugzilla.suse.com/1003579", }, { category: "external", summary: "SUSE Bug 1022633 for CVE-2016-9840", url: "https://bugzilla.suse.com/1022633", }, { category: "external", summary: "SUSE Bug 1023215 for CVE-2016-9840", url: "https://bugzilla.suse.com/1023215", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9840", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1062104 for CVE-2016-9840", url: "https://bugzilla.suse.com/1062104", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9840", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9840", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9840", url: "https://bugzilla.suse.com/1127473", }, { category: "external", summary: "SUSE Bug 1184301 for CVE-2016-9840", url: "https://bugzilla.suse.com/1184301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9840", }, { cve: "CVE-2016-9841", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9841", }, ], notes: [ { category: "general", text: "inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9841", url: "https://www.suse.com/security/cve/CVE-2016-9841", }, { category: "external", summary: "SUSE Bug 1003579 for CVE-2016-9841", url: "https://bugzilla.suse.com/1003579", }, { category: "external", summary: "SUSE Bug 1022633 for CVE-2016-9841", url: "https://bugzilla.suse.com/1022633", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9841", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1064070 for CVE-2016-9841", url: "https://bugzilla.suse.com/1064070", }, { category: "external", summary: "SUSE Bug 1070162 for CVE-2016-9841", url: "https://bugzilla.suse.com/1070162", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9841", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9841", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9841", url: "https://bugzilla.suse.com/1127473", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9841", }, { cve: "CVE-2016-9842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9842", }, ], notes: [ { category: "general", text: "The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9842", url: "https://www.suse.com/security/cve/CVE-2016-9842", }, { category: "external", summary: "SUSE Bug 1003580 for CVE-2016-9842", url: "https://bugzilla.suse.com/1003580", }, { category: "external", summary: "SUSE Bug 1022633 for CVE-2016-9842", url: "https://bugzilla.suse.com/1022633", }, { category: "external", summary: "SUSE Bug 1023215 for CVE-2016-9842", url: "https://bugzilla.suse.com/1023215", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9842", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1062104 for CVE-2016-9842", url: "https://bugzilla.suse.com/1062104", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9842", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9842", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9842", url: "https://bugzilla.suse.com/1127473", }, { category: "external", summary: "SUSE Bug 1184301 for CVE-2016-9842", url: "https://bugzilla.suse.com/1184301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9842", }, { cve: "CVE-2016-9843", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-9843", }, ], notes: [ { category: "general", text: "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-9843", url: "https://www.suse.com/security/cve/CVE-2016-9843", }, { category: "external", summary: "SUSE Bug 1003580 for CVE-2016-9843", url: "https://bugzilla.suse.com/1003580", }, { category: "external", summary: "SUSE Bug 1013882 for CVE-2016-9843", url: "https://bugzilla.suse.com/1013882", }, { category: "external", summary: "SUSE Bug 1038505 for CVE-2016-9843", url: "https://bugzilla.suse.com/1038505", }, { category: "external", summary: "SUSE Bug 1062104 for CVE-2016-9843", url: "https://bugzilla.suse.com/1062104", }, { category: "external", summary: "SUSE Bug 1116686 for CVE-2016-9843", url: "https://bugzilla.suse.com/1116686", }, { category: "external", summary: "SUSE Bug 1120866 for CVE-2016-9843", url: "https://bugzilla.suse.com/1120866", }, { category: "external", summary: "SUSE Bug 1123150 for CVE-2016-9843", url: "https://bugzilla.suse.com/1123150", }, { category: "external", summary: "SUSE Bug 1127473 for CVE-2016-9843", url: "https://bugzilla.suse.com/1127473", }, { category: "external", summary: "SUSE Bug 1184301 for CVE-2016-9843", url: "https://bugzilla.suse.com/1184301", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2016-9843", }, { cve: "CVE-2017-1000100", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000100", }, ], notes: [ { category: "general", text: "When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000100", url: "https://www.suse.com/security/cve/CVE-2017-1000100", }, { category: "external", summary: "SUSE Bug 1051644 for CVE-2017-1000100", url: "https://bugzilla.suse.com/1051644", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2017-1000100", }, { cve: "CVE-2017-1000101", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000101", }, ], notes: [ { category: "general", text: "curl supports \"globbing\" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000101", url: "https://www.suse.com/security/cve/CVE-2017-1000101", }, { category: "external", summary: "SUSE Bug 1051643 for CVE-2017-1000101", url: "https://bugzilla.suse.com/1051643", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-1000101", }, { cve: "CVE-2017-1000366", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-1000366", }, ], notes: [ { category: "general", text: "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-1000366", url: "https://www.suse.com/security/cve/CVE-2017-1000366", }, { category: "external", summary: "SUSE Bug 1037551 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1037551", }, { category: "external", summary: "SUSE Bug 1039357 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1039357", }, { category: "external", summary: "SUSE Bug 1063847 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1063847", }, { category: "external", summary: "SUSE Bug 1071319 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1071319", }, { category: "external", summary: "SUSE Bug 1123874 for CVE-2017-1000366", url: "https://bugzilla.suse.com/1123874", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-1000366", }, { cve: "CVE-2017-10684", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10684", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10684", url: "https://www.suse.com/security/cve/CVE-2017-10684", }, { category: "external", summary: "SUSE Bug 1046858 for CVE-2017-10684", url: "https://bugzilla.suse.com/1046858", }, { category: "external", summary: "SUSE Bug 1115932 for CVE-2017-10684", url: "https://bugzilla.suse.com/1115932", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-10684", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-10684", }, { cve: "CVE-2017-10685", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10685", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10685", url: "https://www.suse.com/security/cve/CVE-2017-10685", }, { category: "external", summary: "SUSE Bug 1046853 for CVE-2017-10685", url: "https://bugzilla.suse.com/1046853", }, { category: "external", summary: "SUSE Bug 1115932 for CVE-2017-10685", url: "https://bugzilla.suse.com/1115932", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-10685", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-10685", }, { cve: "CVE-2017-11112", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-11112", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-11112", url: "https://www.suse.com/security/cve/CVE-2017-11112", }, { category: "external", summary: "SUSE Bug 1046853 for CVE-2017-11112", url: "https://bugzilla.suse.com/1046853", }, { category: "external", summary: "SUSE Bug 1047964 for CVE-2017-11112", url: "https://bugzilla.suse.com/1047964", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-11112", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-11112", }, { cve: "CVE-2017-11113", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-11113", }, ], notes: [ { category: "general", text: "In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-11113", url: "https://www.suse.com/security/cve/CVE-2017-11113", }, { category: "external", summary: "SUSE Bug 1046853 for CVE-2017-11113", url: "https://bugzilla.suse.com/1046853", }, { category: "external", summary: "SUSE Bug 1047965 for CVE-2017-11113", url: "https://bugzilla.suse.com/1047965", }, { category: "external", summary: "SUSE Bug 1175501 for CVE-2017-11113", url: "https://bugzilla.suse.com/1175501", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-11113", }, { cve: "CVE-2017-2616", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-2616", }, ], notes: [ { category: "general", text: "A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-2616", url: "https://www.suse.com/security/cve/CVE-2017-2616", }, { category: "external", summary: "SUSE Bug 1023041 for CVE-2017-2616", url: "https://bugzilla.suse.com/1023041", }, { category: "external", summary: "SUSE Bug 1123789 for CVE-2017-2616", url: "https://bugzilla.suse.com/1123789", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2017-2616", }, { cve: "CVE-2017-6507", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6507", }, ], notes: [ { category: "general", text: "An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6507", url: "https://www.suse.com/security/cve/CVE-2017-6507", }, { category: "external", summary: "SUSE Bug 1029696 for CVE-2017-6507", url: "https://bugzilla.suse.com/1029696", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-6507", }, { cve: "CVE-2017-7407", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7407", }, ], notes: [ { category: "general", text: "The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7407", url: "https://www.suse.com/security/cve/CVE-2017-7407", }, { category: "external", summary: "SUSE Bug 1032309 for CVE-2017-7407", url: "https://bugzilla.suse.com/1032309", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2017-7407", }, { cve: "CVE-2017-7526", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-7526", }, ], notes: [ { category: "general", text: "libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-7526", url: "https://www.suse.com/security/cve/CVE-2017-7526", }, { category: "external", summary: "SUSE Bug 1046607 for CVE-2017-7526", url: "https://bugzilla.suse.com/1046607", }, { category: "external", summary: "SUSE Bug 1047462 for CVE-2017-7526", url: "https://bugzilla.suse.com/1047462", }, { category: "external", summary: "SUSE Bug 1123792 for CVE-2017-7526", url: "https://bugzilla.suse.com/1123792", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.9, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "low", }, ], title: "CVE-2017-7526", }, { cve: "CVE-2017-9047", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9047", }, ], notes: [ { category: "general", text: "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9047", url: "https://www.suse.com/security/cve/CVE-2017-9047", }, { category: "external", summary: "SUSE Bug 1039063 for CVE-2017-9047", url: "https://bugzilla.suse.com/1039063", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9047", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039657 for CVE-2017-9047", url: "https://bugzilla.suse.com/1039657", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2017-9047", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-9047", }, { cve: "CVE-2017-9048", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9048", }, ], notes: [ { category: "general", text: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9048", url: "https://www.suse.com/security/cve/CVE-2017-9048", }, { category: "external", summary: "SUSE Bug 1039064 for CVE-2017-9048", url: "https://bugzilla.suse.com/1039064", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9048", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039658 for CVE-2017-9048", url: "https://bugzilla.suse.com/1039658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "moderate", }, ], title: "CVE-2017-9048", }, { cve: "CVE-2017-9049", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9049", }, ], notes: [ { category: "general", text: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9049", url: "https://www.suse.com/security/cve/CVE-2017-9049", }, { category: "external", summary: "SUSE Bug 1039063 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039063", }, { category: "external", summary: "SUSE Bug 1039064 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039064", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039659 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039659", }, { category: "external", summary: "SUSE Bug 1039661 for CVE-2017-9049", url: "https://bugzilla.suse.com/1039661", }, { category: "external", summary: "SUSE Bug 1069690 for CVE-2017-9049", url: "https://bugzilla.suse.com/1069690", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2017-9049", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2017-9049", }, { cve: "CVE-2017-9050", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9050", }, ], notes: [ { category: "general", text: "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9050", url: "https://www.suse.com/security/cve/CVE-2017-9050", }, { category: "external", summary: "SUSE Bug 1039066 for CVE-2017-9050", url: "https://bugzilla.suse.com/1039066", }, { category: "external", summary: "SUSE Bug 1039069 for CVE-2017-9050", url: "https://bugzilla.suse.com/1039069", }, { category: "external", summary: "SUSE Bug 1039661 for CVE-2017-9050", url: "https://bugzilla.suse.com/1039661", }, { category: "external", summary: "SUSE Bug 1069433 for CVE-2017-9050", url: "https://bugzilla.suse.com/1069433", }, { category: "external", summary: "SUSE Bug 1069690 for CVE-2017-9050", url: "https://bugzilla.suse.com/1069690", }, { category: "external", summary: "SUSE Bug 1123919 for CVE-2017-9050", url: "https://bugzilla.suse.com/1123919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2017-9050", }, { cve: "CVE-2017-9233", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9233", }, ], notes: [ { category: "general", text: "XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9233", url: "https://www.suse.com/security/cve/CVE-2017-9233", }, { category: "external", summary: "SUSE Bug 1030296 for CVE-2017-9233", url: "https://bugzilla.suse.com/1030296", }, { category: "external", summary: "SUSE Bug 1047236 for CVE-2017-9233", url: "https://bugzilla.suse.com/1047236", }, { category: "external", summary: "SUSE Bug 1073350 for CVE-2017-9233", url: "https://bugzilla.suse.com/1073350", }, { category: "external", summary: "SUSE Bug 1123115 for CVE-2017-9233", url: "https://bugzilla.suse.com/1123115", }, { category: "external", summary: "SUSE Bug 983216 for CVE-2017-9233", url: "https://bugzilla.suse.com/983216", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x", "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-10-10T19:37:24Z", details: "important", }, ], title: "CVE-2017-9233", }, ], }
gsd-2014-7187
Vulnerability from gsd
{ GSD: { alias: "CVE-2014-7187", description: "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", id: "GSD-2014-7187", references: [ "https://www.suse.com/security/cve/CVE-2014-7187.html", "https://access.redhat.com/errata/RHSA-2014:1865", "https://access.redhat.com/errata/RHSA-2014:1354", "https://access.redhat.com/errata/RHSA-2014:1312", "https://access.redhat.com/errata/RHSA-2014:1311", "https://access.redhat.com/errata/RHSA-2014:1306", "https://ubuntu.com/security/CVE-2014-7187", "https://advisories.mageia.org/CVE-2014-7187.html", "https://alas.aws.amazon.com/cve/html/CVE-2014-7187.html", "https://linux.oracle.com/cve/CVE-2014-7187.html", "https://packetstormsecurity.com/files/cve/CVE-2014-7187", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2014-7187", ], details: "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", id: "GSD-2014-7187", modified: "2023-12-13T01:22:47.330410Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-7187", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "HPSBMU03165", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { name: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", refsource: "CONFIRM", url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { name: "HPSBST03131", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383138121313&w=2", }, { name: "SSRT101819", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/533593/100/0/threaded", }, { name: "HPSBMU03245", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "openSUSE-SU-2014:1229", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "61188", refsource: "SECUNIA", url: "http://secunia.com/advisories/61188", }, { name: "JVN#55667175", refsource: "JVN", url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "openSUSE-SU-2014:1254", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", }, { name: "60433", refsource: "SECUNIA", url: "http://secunia.com/advisories/60433", }, { name: "[oss-security] 20140925 Fwd: Non-upstream patches for bash", refsource: "MLIST", url: "http://openwall.com/lists/oss-security/2014/09/25/32", }, { name: "HPSBMU03143", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "HPSBMU03182", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "HPSBST03155", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { name: "http://support.novell.com/security/cve/CVE-2014-7187.html", refsource: "CONFIRM", url: "http://support.novell.com/security/cve/CVE-2014-7187.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "61636", refsource: "SECUNIA", url: "http://secunia.com/advisories/61636", }, { name: "61816", refsource: "SECUNIA", url: "http://secunia.com/advisories/61816", }, { name: "openSUSE-SU-2014:1310", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "61442", refsource: "SECUNIA", url: "http://secunia.com/advisories/61442", }, { name: "HPSBMU03246", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "61283", refsource: "SECUNIA", url: "http://secunia.com/advisories/61283", }, { name: "APPLE-SA-2015-09-30-3", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", refsource: "CONFIRM", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "openSUSE-SU-2014:1308", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", }, { name: "61654", refsource: "SECUNIA", url: "http://secunia.com/advisories/61654", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", refsource: "CONFIRM", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "62312", refsource: "SECUNIA", url: "http://secunia.com/advisories/62312", }, { name: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", refsource: "CONFIRM", url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "HPSBMU03217", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "RHSA-2014:1312", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1312.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "SSRT101868", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "61703", refsource: "SECUNIA", url: "http://secunia.com/advisories/61703", }, { name: "USN-2364-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2364-1", }, { name: "61065", refsource: "SECUNIA", url: "http://secunia.com/advisories/61065", }, { name: "HPSBST03129", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "HPSBMU03144", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "JVNDB-2014-000126", refsource: "JVNDB", url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "SSRT101827", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "61641", refsource: "SECUNIA", url: "http://secunia.com/advisories/61641", }, { name: "SUSE-SU-2014:1247", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", }, { name: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", refsource: "CONFIRM", url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2014/Oct/0", }, { name: "MDVSA-2015:164", refsource: "MANDRIVA", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { name: "https://support.apple.com/HT205267", refsource: "CONFIRM", url: "https://support.apple.com/HT205267", }, { name: "HPSBMU03220", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "60024", refsource: "SECUNIA", url: "http://secunia.com/advisories/60024", }, { name: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { name: "61622", refsource: "SECUNIA", url: "http://secunia.com/advisories/61622", }, { name: "20140926 GNU Bash Environment Variable Command Injection Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", refsource: "MLIST", url: "http://openwall.com/lists/oss-security/2014/09/28/10", }, { name: "62343", refsource: "SECUNIA", url: "http://secunia.com/advisories/62343", }, { name: "61565", refsource: "SECUNIA", url: "http://secunia.com/advisories/61565", }, { name: "https://www.suse.com/support/shellshock/", refsource: "CONFIRM", url: "https://www.suse.com/support/shellshock/", }, { name: "http://support.apple.com/HT204244", refsource: "CONFIRM", url: "http://support.apple.com/HT204244", }, { name: "HPSBST03157", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "61313", refsource: "SECUNIA", url: "http://secunia.com/advisories/61313", }, { name: "SSRT101830", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "SSRT101742", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "61873", refsource: "SECUNIA", url: "http://secunia.com/advisories/61873", }, { name: "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", refsource: "MLIST", url: "http://openwall.com/lists/oss-security/2014/09/26/2", }, { name: "61485", refsource: "SECUNIA", url: "http://secunia.com/advisories/61485", }, { name: "openSUSE-SU-2014:1242", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", }, { name: "61618", refsource: "SECUNIA", url: "http://secunia.com/advisories/61618", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", refsource: "CONFIRM", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "HPSBST03154", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "HPSBGN03142", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "61312", refsource: "SECUNIA", url: "http://secunia.com/advisories/61312", }, { name: "60193", refsource: "SECUNIA", url: "http://secunia.com/advisories/60193", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", refsource: "CONFIRM", url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "61479", refsource: "SECUNIA", url: "http://secunia.com/advisories/61479", }, { name: "60063", refsource: "SECUNIA", url: "http://secunia.com/advisories/60063", }, { name: "60034", refsource: "SECUNIA", url: "http://secunia.com/advisories/60034", }, { name: "59907", refsource: "SECUNIA", url: "http://secunia.com/advisories/59907", }, { name: "58200", refsource: "SECUNIA", url: "http://secunia.com/advisories/58200", }, { name: "HPSBST03181", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "61643", refsource: "SECUNIA", url: "http://secunia.com/advisories/61643", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015721", refsource: "CONFIRM", url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "61503", refsource: "SECUNIA", url: "http://secunia.com/advisories/61503", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "RHSA-2014:1354", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1354.html", }, { name: "HPSBMU03236", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { name: "http://www.qnap.com/i/en/support/con_show.php?cid=61", refsource: "CONFIRM", url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "HPSBST03148", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141694386919794&w=2", }, { name: "61552", refsource: "SECUNIA", url: "http://secunia.com/advisories/61552", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { name: "https://support.citrix.com/article/CTX200223", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX200223", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", }, { name: "HPSBGN03138", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "61855", refsource: "SECUNIA", url: "http://secunia.com/advisories/61855", }, { name: "60044", refsource: "SECUNIA", url: "http://secunia.com/advisories/60044", }, { name: "61291", refsource: "SECUNIA", url: "http://secunia.com/advisories/61291", }, { name: "HPSBHF03125", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "61287", refsource: "SECUNIA", url: "http://secunia.com/advisories/61287", }, { name: "HPSBGN03233", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101739", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "APPLE-SA-2015-01-27-4", refsource: "APPLE", url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "HPSBGN03141", refsource: "HP", url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "RHSA-2014:1311", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2014-1311.html", }, { name: "61128", refsource: "SECUNIA", url: "http://secunia.com/advisories/61128", }, { name: "https://support.citrix.com/article/CTX200217", refsource: "CONFIRM", url: "https://support.citrix.com/article/CTX200217", }, { name: "60055", refsource: "SECUNIA", url: "http://secunia.com/advisories/60055", }, { name: "61550", refsource: "SECUNIA", url: "http://secunia.com/advisories/61550", }, { name: "61633", refsource: "SECUNIA", url: "http://secunia.com/advisories/61633", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { name: "https://kb.bluecoat.com/index?page=content&id=SA82", refsource: "CONFIRM", url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "SUSE-SU-2014:1259", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", }, { name: "61328", refsource: "SECUNIA", url: "http://secunia.com/advisories/61328", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "61129", refsource: "SECUNIA", url: "http://secunia.com/advisories/61129", }, { name: "61603", refsource: "SECUNIA", url: "http://secunia.com/advisories/61603", }, { name: "61857", refsource: "SECUNIA", url: "http://secunia.com/advisories/61857", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", refsource: "CONFIRM", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2014-7187", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-119", }, ], }, ], }, references: { reference_data: [ { name: "[oss-security] 20140928 Re: CVE-2014-6271: remote code execution through bash", refsource: "MLIST", tags: [], url: "http://openwall.com/lists/oss-security/2014/09/28/10", }, { name: "[oss-security] 20140925 Fwd: Non-upstream patches for bash", refsource: "MLIST", tags: [ "Exploit", ], url: "http://openwall.com/lists/oss-security/2014/09/25/32", }, { name: "[oss-security] 20140926 Re: Fwd: Non-upstream patches for bash", refsource: "MLIST", tags: [], url: "http://openwall.com/lists/oss-security/2014/09/26/2", }, { name: "https://www.suse.com/support/shellshock/", refsource: "CONFIRM", tags: [], url: "https://www.suse.com/support/shellshock/", }, { name: "http://support.novell.com/security/cve/CVE-2014-7187.html", refsource: "CONFIRM", tags: [], url: "http://support.novell.com/security/cve/CVE-2014-7187.html", }, { name: "61479", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61479", }, { name: "61641", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61641", }, { name: "61618", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61618", }, { name: "61622", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61622", }, { name: "https://kb.bluecoat.com/index?page=content&id=SA82", refsource: "CONFIRM", tags: [], url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { name: "61636", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61636", }, { name: "openSUSE-SU-2014:1242", refsource: "SUSE", tags: [], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", }, { name: "openSUSE-SU-2014:1229", refsource: "SUSE", tags: [], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", }, { name: "SUSE-SU-2014:1247", refsource: "SUSE", tags: [], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", }, { name: "openSUSE-SU-2014:1254", refsource: "SUSE", tags: [], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", }, { name: "RHSA-2014:1311", refsource: "REDHAT", tags: [], url: "http://rhn.redhat.com/errata/RHSA-2014-1311.html", }, { name: "20140926 GNU Bash Environment Variable Command Injection Vulnerability", refsource: "CISCO", tags: [], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { name: "USN-2364-1", refsource: "UBUNTU", tags: [], url: "http://www.ubuntu.com/usn/USN-2364-1", }, { name: "SUSE-SU-2014:1259", refsource: "SUSE", tags: [], url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", }, { name: "RHSA-2014:1312", refsource: "REDHAT", tags: [], url: "http://rhn.redhat.com/errata/RHSA-2014-1312.html", }, { name: "61485", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61485", }, { name: "59907", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/59907", }, { name: "61654", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61654", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { name: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", refsource: "MISC", tags: [], url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { name: "http://www.novell.com/support/kb/doc.php?id=7015721", refsource: "CONFIRM", tags: [], url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { name: "61565", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61565", }, { name: "61643", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61643", }, { name: "61503", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61503", }, { name: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", refsource: "CONFIRM", tags: [], url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { name: "61633", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61633", }, { name: "61552", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61552", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { name: "61703", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61703", }, { name: "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", refsource: "FULLDISC", tags: [], url: "http://seclists.org/fulldisclosure/2014/Oct/0", }, { name: "61283", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61283", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { name: "61603", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61603", }, { name: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", refsource: "MISC", tags: [], url: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", }, { name: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", refsource: "CONFIRM", tags: [], url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", refsource: "CONFIRM", tags: [], url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", }, { name: "HPSBGN03138", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { name: "61188", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61188", }, { name: "HPSBHF03125", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { name: "https://support.citrix.com/article/CTX200217", refsource: "CONFIRM", tags: [], url: "https://support.citrix.com/article/CTX200217", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, { name: "60034", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/60034", }, { name: "61816", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61816", }, { name: "61128", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61128", }, { name: "61313", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61313", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { name: "61442", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61442", }, { name: "61287", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61287", }, { name: "https://support.citrix.com/article/CTX200223", refsource: "CONFIRM", tags: [], url: "https://support.citrix.com/article/CTX200223", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { name: "60055", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/60055", }, { name: "61129", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61129", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { name: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", refsource: "CONFIRM", tags: [], url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { name: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", refsource: "CONFIRM", tags: [], url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { name: "58200", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/58200", }, { name: "61328", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61328", }, { name: "61857", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61857", }, { name: "60193", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/60193", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { name: "61065", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61065", }, { name: "61550", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61550", }, { name: "61855", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61855", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { name: "61312", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61312", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { name: "60063", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/60063", }, { name: "61291", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61291", }, { name: "60044", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/60044", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { name: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", refsource: "CONFIRM", tags: [], url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { name: "60433", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/60433", }, { name: "60024", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/60024", }, { name: "HPSBGN03141", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { name: "HPSBGN03142", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { name: "openSUSE-SU-2014:1310", refsource: "SUSE", tags: [], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { name: "HPSBST03157", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { name: "JVN#55667175", refsource: "JVN", tags: [], url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { name: "HPSBMU03144", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { name: "HPSBST03131", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141383138121313&w=2", }, { name: "http://www.qnap.com/i/en/support/con_show.php?cid=61", refsource: "CONFIRM", tags: [], url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { name: "HPSBMU03143", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { name: "openSUSE-SU-2014:1308", refsource: "SUSE", tags: [], url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", }, { name: "JVNDB-2014-000126", refsource: "JVNDB", tags: [], url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { name: "HPSBST03129", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { name: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", refsource: "CONFIRM", tags: [], url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", }, { name: "RHSA-2014:1354", refsource: "REDHAT", tags: [], url: "http://rhn.redhat.com/errata/RHSA-2014-1354.html", }, { name: "61873", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/61873", }, { name: "HPSBST03181", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { name: "HPSBST03155", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { name: "HPSBST03154", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { name: "HPSBMU03165", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { name: "HPSBMU03182", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { name: "HPSBST03148", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141694386919794&w=2", }, { name: "62343", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/62343", }, { name: "62312", refsource: "SECUNIA", tags: [], url: "http://secunia.com/advisories/62312", }, { name: "APPLE-SA-2015-01-27-4", refsource: "APPLE", tags: [], url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { name: "http://support.apple.com/HT204244", refsource: "CONFIRM", tags: [], url: "http://support.apple.com/HT204244", }, { name: "HPSBMU03245", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { name: "HPSBMU03246", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { name: "SSRT101830", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { name: "HPSBMU03217", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { name: "SSRT101868", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { name: "SSRT101819", refsource: "HP", tags: [], url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { name: "MDVSA-2015:164", refsource: "MANDRIVA", tags: [], url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { name: "APPLE-SA-2015-09-30-3", refsource: "APPLE", tags: [], url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { name: "https://support.apple.com/HT205267", refsource: "CONFIRM", tags: [], url: "https://support.apple.com/HT205267", }, { name: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", refsource: "CONFIRM", tags: [], url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", refsource: "CONFIRM", tags: [], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { name: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", refsource: "CONFIRM", tags: [], url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { name: "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities", refsource: "BUGTRAQ", tags: [], url: "http://www.securityfocus.com/archive/1/533593/100/0/threaded", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, }, lastModifiedDate: "2018-10-09T19:52Z", publishedDate: "2014-09-28T19:55Z", }, }, }
cve-2014-7187
Vulnerability from jvndb
▼ | Vendor | Product |
---|---|---|
QNAP Systems | QNAP QTS |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000126.html", "dc:date": "2015-12-25T13:47+09:00", "dcterms:issued": "2014-10-28T14:39+09:00", "dcterms:modified": "2015-12-25T13:47+09:00", description: "QNAP QTS is an operating system for Turbo NAS. QNAP QTS contains a flaw in the GNU Bash shell, which may result in an OS command injection vulnerability (CWE-78).\r\n\r\nYuuki Wakisaka of University of Electro-Communications reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", link: "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000126.html", "sec:cpe": { "#text": "cpe:/o:qnap:qts", "@product": "QNAP QTS", "@vendor": "QNAP Systems", "@version": "2.2", }, "sec:cvss": { "@score": "10.0", "@severity": "High", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "@version": "2.0", }, "sec:identifier": "JVNDB-2014-000126", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN55667175/index.html", "@id": "JVN#55667175", "@source": "JVN", }, { "#text": "https://jvn.jp/vu/JVNVU97219505/index.html", "@id": "JVNVU#97219505", "@source": "JVN", }, { "#text": "http://jvn.jp/vu/JVNVU97220341/index.html", "@id": "JVNVU#97220341", "@source": "JVN", }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004399.html", "@id": "JVNDB-2014-004399", "@source": "JVN iPedia", }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004410.html", "@id": "JVNDB-2014-004410", "@source": "JVN iPedia", }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004431.html", "@id": "JVNDB-2014-004431", "@source": "JVN iPedia", }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004476.html", "@id": "JVNDB-2014-004476", "@source": "JVN iPedia", }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004432.html", "@id": "JVNDB-2014-004432", "@source": "JVN iPedia", }, { "#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004433.html", "@id": "JVNDB-2014-004433", "@source": "JVN iPedia", }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169", "@id": "CVE-2014-7169", "@source": "CVE", }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271", "@id": "CVE-2014-6271", "@source": "CVE", }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277", "@id": "CVE-2014-6277", "@source": "CVE", }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278", "@id": "CVE-2014-6278", "@source": "CVE", }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186", "@id": "CVE-2014-7186", "@source": "CVE", }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187", "@id": "CVE-2014-7187", "@source": "CVE", }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169", "@id": "CVE-2014-7169", "@source": "NVD", }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271", "@id": "CVE-2014-6271", "@source": "NVD", }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6277", "@id": "CVE-2014-6277", "@source": "NVD", }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6278", "@id": "CVE-2014-6278", "@source": "NVD", }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7186", "@id": "CVE-2014-7186", "@source": "NVD", }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7187", "@id": "CVE-2014-7187", "@source": "NVD", }, { "#text": "http://www.kb.cert.org/vuls/id/252743", "@id": "VU#252743", "@source": "CERT-VN", }, { "#text": "https://ics-cert.us-cert.gov/advisories/ICSA-15-344-01", "@id": "ICSA-15-344-01", "@source": "ICS-CERT ADVISORY", }, { "#text": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-269-01a", "@id": "ICSA-14-269-01A", "@source": "ICS-CERT ADVISORY", }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-78", "@title": "OS Command Injection(CWE-78)", }, ], title: "QNAP QTS vulnerable to OS command injection", }
fkie_cve-2014-7187
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
gnu | bash | 1.14.0 | |
gnu | bash | 1.14.1 | |
gnu | bash | 1.14.2 | |
gnu | bash | 1.14.3 | |
gnu | bash | 1.14.4 | |
gnu | bash | 1.14.5 | |
gnu | bash | 1.14.6 | |
gnu | bash | 1.14.7 | |
gnu | bash | 2.0 | |
gnu | bash | 2.01 | |
gnu | bash | 2.01.1 | |
gnu | bash | 2.02 | |
gnu | bash | 2.02.1 | |
gnu | bash | 2.03 | |
gnu | bash | 2.04 | |
gnu | bash | 2.05 | |
gnu | bash | 2.05 | |
gnu | bash | 2.05 | |
gnu | bash | 3.0 | |
gnu | bash | 3.0.16 | |
gnu | bash | 3.1 | |
gnu | bash | 3.2 | |
gnu | bash | 3.2.48 | |
gnu | bash | 4.0 | |
gnu | bash | 4.0 | |
gnu | bash | 4.1 | |
gnu | bash | 4.2 | |
gnu | bash | 4.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", matchCriteriaId: "FCAC75DF-FFF7-4721-9D47-6E29A5CCB7C8", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", matchCriteriaId: "FCF4B4BB-C5A0-4283-9657-FC61BC95C014", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", matchCriteriaId: "9B04CBBD-E855-48D7-A5C9-AEC2B38FF1F4", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", matchCriteriaId: "972BDA0A-25C8-4C02-8624-07D2462C214C", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", matchCriteriaId: "5B9EDE56-A8C4-40A8-9D14-F6E86F464BD7", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", matchCriteriaId: "DAB4B8E1-E013-4DB5-AF65-70CC2AEC3B20", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", matchCriteriaId: "B5428D5A-7443-4BDD-9690-E44DBDBCAC9E", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", matchCriteriaId: "18A6E8C3-334D-443B-8AD6-F8A131490F4C", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", matchCriteriaId: "5C74DAE6-8A77-47BF-B3ED-D76CD5AD75BB", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", matchCriteriaId: "8B631B7E-C59D-444F-80CE-DC2345A56E97", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", matchCriteriaId: "91C8E637-AD10-4854-AD60-A908D017DDA8", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", matchCriteriaId: "75AB7456-89E4-4F40-82D0-EED52CAEE670", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", matchCriteriaId: "C7E516F7-B6C6-4A0B-90F4-BC0F382E62E4", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", matchCriteriaId: "2E37A5D0-79EB-442D-B4B8-49F5137A3FA9", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", matchCriteriaId: "AE919509-57B0-4D13-9503-943D5BFED620", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", matchCriteriaId: "0F027515-A126-4899-B78E-121C8312002F", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", matchCriteriaId: "AC05A483-FAFD-4C40-85BC-D2EE907B2B54", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", matchCriteriaId: "097C61C9-4761-4D8F-9590-376FC1A5522B", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", matchCriteriaId: "FCA81069-36E0-4035-B31F-A5281E10C760", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", matchCriteriaId: "BC216C39-2EA0-4B58-87EA-81A737E5D2E4", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", matchCriteriaId: "88731DFF-B0B1-4325-A662-287D5E6E7265", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", matchCriteriaId: "A7BB3ECE-0E83-45EB-AC27-BA29E2C52D1A", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*", matchCriteriaId: "3FA313D8-2B28-4C73-A96B-7814C37F0725", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", matchCriteriaId: "43630818-4A62-4766-AADC-AB87BE1C5553", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", matchCriteriaId: "202B9DB4-80DC-4D1C-8DA8-C06E89FF542A", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", matchCriteriaId: "37CB667F-26C8-46FA-81CE-1F6909AC006D", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", matchCriteriaId: "755984AB-D061-45F0-8845-D7B78BA506E5", vulnerable: true, }, { criteria: "cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", matchCriteriaId: "BC1DAC9F-711C-47EA-9BBC-0EDB2AF0A1AC", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.", }, { lang: "es", value: "Error de superación de límite (off-by-one) en la función read_token_word en parse.y en GNU Bash hasta 4.3 bash43-026 permite a atacantes remotos causar una denegación de servicio (acceso a array fuera de rango y caída de la aplicación) o posiblemente tener otro impacto no especificado a través de profundamente anidados para bucles, también conocido como el problema 'word_lineno'.", }, ], id: "CVE-2014-7187", lastModified: "2024-11-21T02:16:29.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2014-09-28T19:55:06.270", references: [ { source: "cve@mitre.org", url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { source: "cve@mitre.org", url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { source: "cve@mitre.org", url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { source: "cve@mitre.org", url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", }, { source: "cve@mitre.org", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=141383138121313&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=141694386919794&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { source: "cve@mitre.org", tags: [ "Exploit", ], url: "http://openwall.com/lists/oss-security/2014/09/25/32", }, { source: "cve@mitre.org", url: "http://openwall.com/lists/oss-security/2014/09/26/2", }, { source: "cve@mitre.org", url: "http://openwall.com/lists/oss-security/2014/09/28/10", }, { source: "cve@mitre.org", url: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", }, { source: "cve@mitre.org", url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { source: "cve@mitre.org", url: "http://rhn.redhat.com/errata/RHSA-2014-1311.html", }, { source: "cve@mitre.org", url: "http://rhn.redhat.com/errata/RHSA-2014-1312.html", }, { source: "cve@mitre.org", url: "http://rhn.redhat.com/errata/RHSA-2014-1354.html", }, { source: "cve@mitre.org", url: "http://seclists.org/fulldisclosure/2014/Oct/0", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/58200", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/59907", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/60024", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/60034", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/60044", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/60055", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/60063", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/60193", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/60433", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61065", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61128", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61129", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61188", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61283", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61287", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61291", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61312", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61313", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61328", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61442", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61479", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61485", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61503", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61550", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61552", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61565", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61603", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61618", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61622", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61633", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61636", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61641", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61643", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61654", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61703", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61816", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61855", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61857", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/61873", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/62312", }, { source: "cve@mitre.org", url: "http://secunia.com/advisories/62343", }, { source: "cve@mitre.org", url: "http://support.apple.com/HT204244", }, { source: "cve@mitre.org", url: "http://support.novell.com/security/cve/CVE-2014-7187.html", }, { source: "cve@mitre.org", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { source: "cve@mitre.org", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { source: "cve@mitre.org", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { source: "cve@mitre.org", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { source: "cve@mitre.org", url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { source: "cve@mitre.org", url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { source: "cve@mitre.org", url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/archive/1/533593/100/0/threaded", }, { source: "cve@mitre.org", url: "http://www.ubuntu.com/usn/USN-2364-1", }, { source: "cve@mitre.org", url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { source: "cve@mitre.org", url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { source: "cve@mitre.org", url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { source: "cve@mitre.org", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { source: "cve@mitre.org", url: "https://support.apple.com/HT205267", }, { source: "cve@mitre.org", url: "https://support.citrix.com/article/CTX200217", }, { source: "cve@mitre.org", url: "https://support.citrix.com/article/CTX200223", }, { source: "cve@mitre.org", url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { source: "cve@mitre.org", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { source: "cve@mitre.org", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { source: "cve@mitre.org", url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { source: "cve@mitre.org", url: "https://www.suse.com/support/shellshock/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://jvn.jp/en/jp/JVN55667175/index.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141330468527613&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141345648114150&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141383026420882&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141383081521087&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141383138121313&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141383196021590&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141383244821813&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141383304022067&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141450491804793&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141576728022234&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141577137423233&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141577241923505&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141577297623641&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141585637922673&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141694386919794&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=141879528318582&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142118135300698&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142289270617409&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142358026505815&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142358078406056&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=142721162228379&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", ], url: "http://openwall.com/lists/oss-security/2014/09/25/32", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://openwall.com/lists/oss-security/2014/09/26/2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://openwall.com/lists/oss-security/2014/09/28/10", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2014-1311.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2014-1312.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://rhn.redhat.com/errata/RHSA-2014-1354.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://seclists.org/fulldisclosure/2014/Oct/0", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/58200", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/59907", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60024", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60034", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60044", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60055", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60063", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60193", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/60433", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61065", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61128", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61129", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61188", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61283", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61287", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61291", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61312", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61313", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61328", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61442", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61479", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61485", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61503", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61550", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61552", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61565", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61603", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61618", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61622", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61633", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61636", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61641", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61643", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61654", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61703", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61816", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61855", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61857", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/61873", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/62312", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://secunia.com/advisories/62343", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://support.apple.com/HT204244", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://support.novell.com/security/cve/CVE-2014-7187.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/support/kb/doc.php?id=7015721", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.qnap.com/i/en/support/con_show.php?cid=61", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/archive/1/533593/100/0/threaded", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.ubuntu.com/usn/USN-2364-1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://kb.bluecoat.com/index?page=content&id=SA82", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.apple.com/HT205267", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.citrix.com/article/CTX200217", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.citrix.com/article/CTX200223", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.suse.com/support/shellshock/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.