Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2018-14680
Vulnerability from cvelistv5
Published
2018-07-28 23:00
Modified
2024-08-05 09:38
Severity ?
EPSS score ?
Summary
An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T09:38:13.342Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "USN-3728-3", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3728-3/", }, { name: "DSA-4260", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "https://www.debian.org/security/2018/dsa-4260", }, { name: "[debian-lts-announce] 20180806 [SECURITY] [DLA-1460-1] libmspack security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00007.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://bugs.debian.org/904801", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2018/07/26/1", }, { name: "RHSA-2018:3505", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3505", }, { name: "USN-3789-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3789-2/", }, { name: "USN-3728-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3728-2/", }, { name: "1041410", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1041410", }, { name: "USN-3728-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "https://usn.ubuntu.com/3728-1/", }, { name: "RHSA-2018:3327", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2018:3327", }, { name: "GLSA-201903-20", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201903-20", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2018-07-28T00:00:00", descriptions: [ { lang: "en", value: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-03-28T04:06:12", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "USN-3728-3", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3728-3/", }, { name: "DSA-4260", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "https://www.debian.org/security/2018/dsa-4260", }, { name: "[debian-lts-announce] 20180806 [SECURITY] [DLA-1460-1] libmspack security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00007.html", }, { tags: [ "x_refsource_MISC", ], url: "https://bugs.debian.org/904801", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a", }, { tags: [ "x_refsource_MISC", ], url: "http://www.openwall.com/lists/oss-security/2018/07/26/1", }, { name: "RHSA-2018:3505", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3505", }, { name: "USN-3789-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3789-2/", }, { name: "USN-3728-2", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3728-2/", }, { name: "1041410", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1041410", }, { name: "USN-3728-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "https://usn.ubuntu.com/3728-1/", }, { name: "RHSA-2018:3327", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2018:3327", }, { name: "GLSA-201903-20", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201903-20", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14680", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "USN-3728-3", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3728-3/", }, { name: "DSA-4260", refsource: "DEBIAN", url: "https://www.debian.org/security/2018/dsa-4260", }, { name: "[debian-lts-announce] 20180806 [SECURITY] [DLA-1460-1] libmspack security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00007.html", }, { name: "https://bugs.debian.org/904801", refsource: "MISC", url: "https://bugs.debian.org/904801", }, { name: "https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a", refsource: "MISC", url: "https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a", }, { name: "http://www.openwall.com/lists/oss-security/2018/07/26/1", refsource: "MISC", url: "http://www.openwall.com/lists/oss-security/2018/07/26/1", }, { name: "RHSA-2018:3505", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3505", }, { name: "USN-3789-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3789-2/", }, { name: "USN-3728-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3728-2/", }, { name: "1041410", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1041410", }, { name: "USN-3728-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3728-1/", }, { name: "RHSA-2018:3327", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3327", }, { name: "GLSA-201903-20", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-20", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2018-14680", datePublished: "2018-07-28T23:00:00", dateReserved: "2018-07-28T00:00:00", dateUpdated: "2024-08-05T09:38:13.342Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cabextract:libmspack:0.0.20060920:alpha:*:*:*:*:*:*\", \"matchCriteriaId\": \"549E0616-8188-411B-9493-8E861AAEDBF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cabextract:libmspack:0.3:alpha:*:*:*:*:*:*\", \"matchCriteriaId\": \"32C98EEF-4AD0-4A72-85A1-77CF77EE9BE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cabextract:libmspack:0.4:alpha:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA4A4DCD-E207-467D-9543-C8EDE71E32ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cabextract:libmspack:0.5:alpha:*:*:*:*:*:*\", \"matchCriteriaId\": \"120C65CB-4E1C-4972-8EA8-C4A6FC09D63A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cabextract:libmspack:0.6:alpha:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7A513DB-0953-4749-9EB9-BB88F0138CF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cabextract_project:cabextract:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.5\", \"matchCriteriaId\": \"0E0CEBA0-EE24-4721-98CC-0CD2E2350FDC\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\", \"matchCriteriaId\": \"8D305F7A-D159-4716-AB26-5E38BB5CD991\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"B5A6F2F3-4894-4392-8296-3B8DD2679084\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5319543-0143-4E2E-AA77-B7F116C1336C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33C068A4-3780-4EAB-A937-6082DF847564\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51EF4996-72F4-4FA4-814F-F5991E7A8318\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.\"}, {\"lang\": \"es\", \"value\": \"Se ha descubierto un problema en mspack/chmd.c en libmspack en versiones anteriores a la 0.7alpha. No rechaza los nombres de archivos CHM en blanco.\"}]", id: "CVE-2018-14680", lastModified: "2024-11-21T03:49:34.480", metrics: "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}", published: "2018-07-28T23:29:00.297", references: "[{\"url\": \"http://www.openwall.com/lists/oss-security/2018/07/26/1\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id/1041410\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:3327\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:3505\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugs.debian.org/904801\", \"source\": \"cve@mitre.org\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/08/msg00007.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201903-20\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3728-1/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3728-2/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3728-3/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3789-2/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4260\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2018/07/26/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id/1041410\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:3327\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:3505\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugs.debian.org/904801\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Mailing List\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2018/08/msg00007.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201903-20\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3728-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3728-2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3728-3/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://usn.ubuntu.com/3789-2/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.debian.org/security/2018/dsa-4260\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]", sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2018-14680\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-07-28T23:29:00.297\",\"lastModified\":\"2024-11-21T03:49:34.480\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema en mspack/chmd.c en libmspack en versiones anteriores a la 0.7alpha. No rechaza los nombres de archivos CHM en blanco.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cabextract:libmspack:0.0.20060920:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"549E0616-8188-411B-9493-8E861AAEDBF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cabextract:libmspack:0.3:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"32C98EEF-4AD0-4A72-85A1-77CF77EE9BE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cabextract:libmspack:0.4:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA4A4DCD-E207-467D-9543-C8EDE71E32ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cabextract:libmspack:0.5:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"120C65CB-4E1C-4972-8EA8-C4A6FC09D63A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cabextract:libmspack:0.6:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7A513DB-0953-4749-9EB9-BB88F0138CF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cabextract_project:cabextract:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.5\",\"matchCriteriaId\":\"0E0CEBA0-EE24-4721-98CC-0CD2E2350FDC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"8D305F7A-D159-4716-AB26-5E38BB5CD991\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5319543-0143-4E2E-AA77-B7F116C1336C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2018/07/26/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1041410\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3327\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3505\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.debian.org/904801\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/08/msg00007.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201903-20\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3728-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3728-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3728-3/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3789-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4260\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2018/07/26/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1041410\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3327\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:3505\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugs.debian.org/904801\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/08/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201903-20\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3728-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3728-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3728-3/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3789-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4260\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", }, }
rhsa-2018:3327
Vulnerability from csaf_redhat
Published
2018-10-30 14:43
Modified
2024-11-22 12:14
Summary
Red Hat Security Advisory: libmspack security update
Notes
Topic
An update for libmspack is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft.
Security Fix(es):
* libmspack: off-by-one error in the CHM PMGI/PMGL chunk number validity checks (CVE-2018-14679)
* libmspack: off-by-one error in the CHM chunk number validity checks (CVE-2018-14680)
* libmspack: out-of-bounds write in kwajd_read_headers in mspack/kwajd.c (CVE-2018-14681)
* libmspack: off-by-one error in the TOLOWER() macro for CHM decompression (CVE-2018-14682)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Low", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for libmspack is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft.\n\nSecurity Fix(es):\n\n* libmspack: off-by-one error in the CHM PMGI/PMGL chunk number validity checks (CVE-2018-14679)\n\n* libmspack: off-by-one error in the CHM chunk number validity checks (CVE-2018-14680)\n\n* libmspack: out-of-bounds write in kwajd_read_headers in mspack/kwajd.c (CVE-2018-14681)\n\n* libmspack: off-by-one error in the TOLOWER() macro for CHM decompression (CVE-2018-14682)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:3327", url: "https://access.redhat.com/errata/RHSA-2018:3327", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#low", url: "https://access.redhat.com/security/updates/classification/#low", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index", url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index", }, { category: "external", summary: "1610890", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610890", }, { category: "external", summary: "1610896", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610896", }, { category: "external", summary: "1610934", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610934", }, { category: "external", summary: "1610941", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610941", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3327.json", }, ], title: "Red Hat Security Advisory: libmspack security update", tracking: { current_release_date: "2024-11-22T12:14:54+00:00", generator: { date: "2024-11-22T12:14:54+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:3327", initial_release_date: "2018-10-30T14:43:48+00:00", revision_history: [ { date: "2018-10-30T14:43:48+00:00", number: "1", summary: "Initial version", }, { date: "2018-10-30T14:43:48+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T12:14:54+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Client (v. 7)", product: { name: "Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Client Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", product: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", product_id: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-debuginfo@0.5-0.6.alpha.el7?arch=x86_64", }, }, }, { category: "product_version", name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", product: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", product_id: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-devel@0.5-0.6.alpha.el7?arch=x86_64", }, }, }, { category: "product_version", name: "libmspack-0:0.5-0.6.alpha.el7.x86_64", product: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64", product_id: "libmspack-0:0.5-0.6.alpha.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack@0.5-0.6.alpha.el7?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", product: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", product_id: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-debuginfo@0.5-0.6.alpha.el7?arch=i686", }, }, }, { category: "product_version", name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", product: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", product_id: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-devel@0.5-0.6.alpha.el7?arch=i686", }, }, }, { category: "product_version", name: "libmspack-0:0.5-0.6.alpha.el7.i686", product: { name: "libmspack-0:0.5-0.6.alpha.el7.i686", product_id: "libmspack-0:0.5-0.6.alpha.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack@0.5-0.6.alpha.el7?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "libmspack-0:0.5-0.6.alpha.el7.src", product: { name: "libmspack-0:0.5-0.6.alpha.el7.src", product_id: "libmspack-0:0.5-0.6.alpha.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack@0.5-0.6.alpha.el7?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", product: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", product_id: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-debuginfo@0.5-0.6.alpha.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", product: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", product_id: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack@0.5-0.6.alpha.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", product: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", product_id: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-devel@0.5-0.6.alpha.el7?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", product: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", product_id: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-debuginfo@0.5-0.6.alpha.el7?arch=aarch64", }, }, }, { category: "product_version", name: "libmspack-0:0.5-0.6.alpha.el7.aarch64", product: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64", product_id: "libmspack-0:0.5-0.6.alpha.el7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack@0.5-0.6.alpha.el7?arch=aarch64", }, }, }, { category: "product_version", name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", product: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", product_id: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-devel@0.5-0.6.alpha.el7?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.6", }, ], }, vulnerabilities: [ { cve: "CVE-2018-14679", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2018-07-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1610890", }, ], notes: [ { category: "description", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (uninitialized data dereference and application crash).", title: "Vulnerability description", }, { category: "summary", text: "libmspack: off-by-one error in the CHM PMGI/PMGL chunk number validity checks", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of libmspack as shipped with Red Hat Enterprise Linux 7.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-14679", }, { category: "external", summary: "RHBZ#1610890", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610890", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-14679", url: "https://www.cve.org/CVERecord?id=CVE-2018-14679", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-14679", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14679", }, ], release_date: "2018-05-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-10-30T14:43:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:3327", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "libmspack: off-by-one error in the CHM PMGI/PMGL chunk number validity checks", }, { cve: "CVE-2018-14680", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2018-07-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1610934", }, ], notes: [ { category: "description", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.", title: "Vulnerability description", }, { category: "summary", text: "libmspack: off-by-one error in the CHM chunk number validity checks", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of libmspack as shipped with Red Hat Enterprise Linux 7.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-14680", }, { category: "external", summary: "RHBZ#1610934", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610934", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-14680", url: "https://www.cve.org/CVERecord?id=CVE-2018-14680", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-14680", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14680", }, ], release_date: "2018-05-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-10-30T14:43:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:3327", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "libmspack: off-by-one error in the CHM chunk number validity checks", }, { cve: "CVE-2018-14681", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2018-07-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1610896", }, ], notes: [ { category: "description", text: "An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.", title: "Vulnerability description", }, { category: "summary", text: "libmspack: out-of-bounds write in kwajd_read_headers in mspack/kwajd.c", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of libmspack as shipped with Red Hat Enterprise Linux 7.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-14681", }, { category: "external", summary: "RHBZ#1610896", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610896", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-14681", url: "https://www.cve.org/CVERecord?id=CVE-2018-14681", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-14681", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14681", }, ], release_date: "2017-11-26T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-10-30T14:43:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:3327", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "libmspack: out-of-bounds write in kwajd_read_headers in mspack/kwajd.c", }, { cve: "CVE-2018-14682", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2018-07-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1610941", }, ], notes: [ { category: "description", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.", title: "Vulnerability description", }, { category: "summary", text: "libmspack: off-by-one error in the TOLOWER() macro for CHM decompression", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of libmspack as shipped with Red Hat Enterprise Linux 7.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-14682", }, { category: "external", summary: "RHBZ#1610941", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610941", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-14682", url: "https://www.cve.org/CVERecord?id=CVE-2018-14682", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-14682", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14682", }, ], release_date: "2018-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-10-30T14:43:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:3327", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "libmspack: off-by-one error in the TOLOWER() macro for CHM decompression", }, ], }
RHSA-2018:3327
Vulnerability from csaf_redhat
Published
2018-10-30 14:43
Modified
2024-11-22 12:14
Summary
Red Hat Security Advisory: libmspack security update
Notes
Topic
An update for libmspack is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft.
Security Fix(es):
* libmspack: off-by-one error in the CHM PMGI/PMGL chunk number validity checks (CVE-2018-14679)
* libmspack: off-by-one error in the CHM chunk number validity checks (CVE-2018-14680)
* libmspack: out-of-bounds write in kwajd_read_headers in mspack/kwajd.c (CVE-2018-14681)
* libmspack: off-by-one error in the TOLOWER() macro for CHM decompression (CVE-2018-14682)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Low", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for libmspack is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft.\n\nSecurity Fix(es):\n\n* libmspack: off-by-one error in the CHM PMGI/PMGL chunk number validity checks (CVE-2018-14679)\n\n* libmspack: off-by-one error in the CHM chunk number validity checks (CVE-2018-14680)\n\n* libmspack: out-of-bounds write in kwajd_read_headers in mspack/kwajd.c (CVE-2018-14681)\n\n* libmspack: off-by-one error in the TOLOWER() macro for CHM decompression (CVE-2018-14682)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:3327", url: "https://access.redhat.com/errata/RHSA-2018:3327", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#low", url: "https://access.redhat.com/security/updates/classification/#low", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index", url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index", }, { category: "external", summary: "1610890", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610890", }, { category: "external", summary: "1610896", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610896", }, { category: "external", summary: "1610934", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610934", }, { category: "external", summary: "1610941", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610941", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3327.json", }, ], title: "Red Hat Security Advisory: libmspack security update", tracking: { current_release_date: "2024-11-22T12:14:54+00:00", generator: { date: "2024-11-22T12:14:54+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:3327", initial_release_date: "2018-10-30T14:43:48+00:00", revision_history: [ { date: "2018-10-30T14:43:48+00:00", number: "1", summary: "Initial version", }, { date: "2018-10-30T14:43:48+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T12:14:54+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Client (v. 7)", product: { name: "Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Client Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", product: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", product_id: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-debuginfo@0.5-0.6.alpha.el7?arch=x86_64", }, }, }, { category: "product_version", name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", product: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", product_id: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-devel@0.5-0.6.alpha.el7?arch=x86_64", }, }, }, { category: "product_version", name: "libmspack-0:0.5-0.6.alpha.el7.x86_64", product: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64", product_id: "libmspack-0:0.5-0.6.alpha.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack@0.5-0.6.alpha.el7?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", product: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", product_id: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-debuginfo@0.5-0.6.alpha.el7?arch=i686", }, }, }, { category: "product_version", name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", product: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", product_id: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-devel@0.5-0.6.alpha.el7?arch=i686", }, }, }, { category: "product_version", name: "libmspack-0:0.5-0.6.alpha.el7.i686", product: { name: "libmspack-0:0.5-0.6.alpha.el7.i686", product_id: "libmspack-0:0.5-0.6.alpha.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack@0.5-0.6.alpha.el7?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "libmspack-0:0.5-0.6.alpha.el7.src", product: { name: "libmspack-0:0.5-0.6.alpha.el7.src", product_id: "libmspack-0:0.5-0.6.alpha.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack@0.5-0.6.alpha.el7?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", product: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", product_id: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-debuginfo@0.5-0.6.alpha.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", product: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", product_id: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack@0.5-0.6.alpha.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", product: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", product_id: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-devel@0.5-0.6.alpha.el7?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", product: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", product_id: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-debuginfo@0.5-0.6.alpha.el7?arch=aarch64", }, }, }, { category: "product_version", name: "libmspack-0:0.5-0.6.alpha.el7.aarch64", product: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64", product_id: "libmspack-0:0.5-0.6.alpha.el7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack@0.5-0.6.alpha.el7?arch=aarch64", }, }, }, { category: "product_version", name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", product: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", product_id: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-devel@0.5-0.6.alpha.el7?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.6", }, ], }, vulnerabilities: [ { cve: "CVE-2018-14679", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2018-07-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1610890", }, ], notes: [ { category: "description", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (uninitialized data dereference and application crash).", title: "Vulnerability description", }, { category: "summary", text: "libmspack: off-by-one error in the CHM PMGI/PMGL chunk number validity checks", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of libmspack as shipped with Red Hat Enterprise Linux 7.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-14679", }, { category: "external", summary: "RHBZ#1610890", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610890", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-14679", url: "https://www.cve.org/CVERecord?id=CVE-2018-14679", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-14679", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14679", }, ], release_date: "2018-05-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-10-30T14:43:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:3327", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "libmspack: off-by-one error in the CHM PMGI/PMGL chunk number validity checks", }, { cve: "CVE-2018-14680", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2018-07-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1610934", }, ], notes: [ { category: "description", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.", title: "Vulnerability description", }, { category: "summary", text: "libmspack: off-by-one error in the CHM chunk number validity checks", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of libmspack as shipped with Red Hat Enterprise Linux 7.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-14680", }, { category: "external", summary: "RHBZ#1610934", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610934", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-14680", url: "https://www.cve.org/CVERecord?id=CVE-2018-14680", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-14680", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14680", }, ], release_date: "2018-05-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-10-30T14:43:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:3327", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "libmspack: off-by-one error in the CHM chunk number validity checks", }, { cve: "CVE-2018-14681", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2018-07-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1610896", }, ], notes: [ { category: "description", text: "An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.", title: "Vulnerability description", }, { category: "summary", text: "libmspack: out-of-bounds write in kwajd_read_headers in mspack/kwajd.c", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of libmspack as shipped with Red Hat Enterprise Linux 7.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-14681", }, { category: "external", summary: "RHBZ#1610896", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610896", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-14681", url: "https://www.cve.org/CVERecord?id=CVE-2018-14681", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-14681", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14681", }, ], release_date: "2017-11-26T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-10-30T14:43:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:3327", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "libmspack: out-of-bounds write in kwajd_read_headers in mspack/kwajd.c", }, { cve: "CVE-2018-14682", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2018-07-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1610941", }, ], notes: [ { category: "description", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.", title: "Vulnerability description", }, { category: "summary", text: "libmspack: off-by-one error in the TOLOWER() macro for CHM decompression", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of libmspack as shipped with Red Hat Enterprise Linux 7.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-14682", }, { category: "external", summary: "RHBZ#1610941", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610941", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-14682", url: "https://www.cve.org/CVERecord?id=CVE-2018-14682", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-14682", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14682", }, ], release_date: "2018-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-10-30T14:43:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:3327", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "libmspack: off-by-one error in the TOLOWER() macro for CHM decompression", }, ], }
rhsa-2018_3327
Vulnerability from csaf_redhat
Published
2018-10-30 14:43
Modified
2024-11-22 12:14
Summary
Red Hat Security Advisory: libmspack security update
Notes
Topic
An update for libmspack is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft.
Security Fix(es):
* libmspack: off-by-one error in the CHM PMGI/PMGL chunk number validity checks (CVE-2018-14679)
* libmspack: off-by-one error in the CHM chunk number validity checks (CVE-2018-14680)
* libmspack: out-of-bounds write in kwajd_read_headers in mspack/kwajd.c (CVE-2018-14681)
* libmspack: off-by-one error in the TOLOWER() macro for CHM decompression (CVE-2018-14682)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Low", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for libmspack is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The libmspack packages contain a library providing compression and extraction of the Cabinet (CAB) file format used by Microsoft.\n\nSecurity Fix(es):\n\n* libmspack: off-by-one error in the CHM PMGI/PMGL chunk number validity checks (CVE-2018-14679)\n\n* libmspack: off-by-one error in the CHM chunk number validity checks (CVE-2018-14680)\n\n* libmspack: out-of-bounds write in kwajd_read_headers in mspack/kwajd.c (CVE-2018-14681)\n\n* libmspack: off-by-one error in the TOLOWER() macro for CHM decompression (CVE-2018-14682)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.6 Release Notes linked from the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2018:3327", url: "https://access.redhat.com/errata/RHSA-2018:3327", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#low", url: "https://access.redhat.com/security/updates/classification/#low", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index", url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index", }, { category: "external", summary: "1610890", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610890", }, { category: "external", summary: "1610896", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610896", }, { category: "external", summary: "1610934", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610934", }, { category: "external", summary: "1610941", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610941", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3327.json", }, ], title: "Red Hat Security Advisory: libmspack security update", tracking: { current_release_date: "2024-11-22T12:14:54+00:00", generator: { date: "2024-11-22T12:14:54+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2018:3327", initial_release_date: "2018-10-30T14:43:48+00:00", revision_history: [ { date: "2018-10-30T14:43:48+00:00", number: "1", summary: "Initial version", }, { date: "2018-10-30T14:43:48+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T12:14:54+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux Client (v. 7)", product: { name: "Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Client Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::client", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product: { name: "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::computenode", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server (v. 7)", product: { name: "Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Server Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::server", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, { category: "product_name", name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product: { name: "Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:7::workstation", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", product: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", product_id: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-debuginfo@0.5-0.6.alpha.el7?arch=x86_64", }, }, }, { category: "product_version", name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", product: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", product_id: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-devel@0.5-0.6.alpha.el7?arch=x86_64", }, }, }, { category: "product_version", name: "libmspack-0:0.5-0.6.alpha.el7.x86_64", product: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64", product_id: "libmspack-0:0.5-0.6.alpha.el7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack@0.5-0.6.alpha.el7?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", product: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", product_id: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-debuginfo@0.5-0.6.alpha.el7?arch=i686", }, }, }, { category: "product_version", name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", product: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", product_id: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-devel@0.5-0.6.alpha.el7?arch=i686", }, }, }, { category: "product_version", name: "libmspack-0:0.5-0.6.alpha.el7.i686", product: { name: "libmspack-0:0.5-0.6.alpha.el7.i686", product_id: "libmspack-0:0.5-0.6.alpha.el7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack@0.5-0.6.alpha.el7?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "libmspack-0:0.5-0.6.alpha.el7.src", product: { name: "libmspack-0:0.5-0.6.alpha.el7.src", product_id: "libmspack-0:0.5-0.6.alpha.el7.src", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack@0.5-0.6.alpha.el7?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", product: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", product_id: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-debuginfo@0.5-0.6.alpha.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", product: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", product_id: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack@0.5-0.6.alpha.el7?arch=ppc64le", }, }, }, { category: "product_version", name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", product: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", product_id: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-devel@0.5-0.6.alpha.el7?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", product: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", product_id: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-debuginfo@0.5-0.6.alpha.el7?arch=aarch64", }, }, }, { category: "product_version", name: "libmspack-0:0.5-0.6.alpha.el7.aarch64", product: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64", product_id: "libmspack-0:0.5-0.6.alpha.el7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack@0.5-0.6.alpha.el7?arch=aarch64", }, }, }, { category: "product_version", name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", product: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", product_id: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/libmspack-devel@0.5-0.6.alpha.el7?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", product_id: "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Client-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", product_id: "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Client-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", product_id: "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7ComputeNode-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", product_id: "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7ComputeNode-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", product_id: "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", product_id: "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-Alt-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", product_id: "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Server-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", product_id: "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Workstation-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.src", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.i686", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", relates_to_product_reference: "7Workstation-optional-7.6", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", product_id: "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", }, product_reference: "libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", relates_to_product_reference: "7Workstation-optional-7.6", }, ], }, vulnerabilities: [ { cve: "CVE-2018-14679", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2018-07-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1610890", }, ], notes: [ { category: "description", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (uninitialized data dereference and application crash).", title: "Vulnerability description", }, { category: "summary", text: "libmspack: off-by-one error in the CHM PMGI/PMGL chunk number validity checks", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of libmspack as shipped with Red Hat Enterprise Linux 7.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-14679", }, { category: "external", summary: "RHBZ#1610890", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610890", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-14679", url: "https://www.cve.org/CVERecord?id=CVE-2018-14679", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-14679", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14679", }, ], release_date: "2018-05-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-10-30T14:43:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:3327", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "libmspack: off-by-one error in the CHM PMGI/PMGL chunk number validity checks", }, { cve: "CVE-2018-14680", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2018-07-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1610934", }, ], notes: [ { category: "description", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.", title: "Vulnerability description", }, { category: "summary", text: "libmspack: off-by-one error in the CHM chunk number validity checks", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of libmspack as shipped with Red Hat Enterprise Linux 7.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-14680", }, { category: "external", summary: "RHBZ#1610934", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610934", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-14680", url: "https://www.cve.org/CVERecord?id=CVE-2018-14680", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-14680", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14680", }, ], release_date: "2018-05-12T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-10-30T14:43:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:3327", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "libmspack: off-by-one error in the CHM chunk number validity checks", }, { cve: "CVE-2018-14681", cwe: { id: "CWE-787", name: "Out-of-bounds Write", }, discovery_date: "2018-07-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1610896", }, ], notes: [ { category: "description", text: "An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.", title: "Vulnerability description", }, { category: "summary", text: "libmspack: out-of-bounds write in kwajd_read_headers in mspack/kwajd.c", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of libmspack as shipped with Red Hat Enterprise Linux 7.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-14681", }, { category: "external", summary: "RHBZ#1610896", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610896", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-14681", url: "https://www.cve.org/CVERecord?id=CVE-2018-14681", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-14681", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14681", }, ], release_date: "2017-11-26T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-10-30T14:43:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:3327", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "libmspack: out-of-bounds write in kwajd_read_headers in mspack/kwajd.c", }, { cve: "CVE-2018-14682", cwe: { id: "CWE-193", name: "Off-by-one Error", }, discovery_date: "2018-07-28T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1610941", }, ], notes: [ { category: "description", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.", title: "Vulnerability description", }, { category: "summary", text: "libmspack: off-by-one error in the TOLOWER() macro for CHM decompression", title: "Vulnerability summary", }, { category: "other", text: "This issue affects the versions of libmspack as shipped with Red Hat Enterprise Linux 7.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2018-14682", }, { category: "external", summary: "RHBZ#1610941", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1610941", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2018-14682", url: "https://www.cve.org/CVERecord?id=CVE-2018-14682", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2018-14682", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14682", }, ], release_date: "2018-02-06T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2018-10-30T14:43:48+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2018:3327", }, ], scores: [ { cvss_v3: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Client-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Client-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7ComputeNode-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7ComputeNode-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-Alt-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-Alt-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Server-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Server-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.src", "7Workstation-optional-7.6:libmspack-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-debuginfo-0:0.5-0.6.alpha.el7.x86_64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.aarch64", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.i686", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.ppc64le", "7Workstation-optional-7.6:libmspack-devel-0:0.5-0.6.alpha.el7.x86_64", ], }, ], threats: [ { category: "impact", details: "Low", }, ], title: "libmspack: off-by-one error in the TOLOWER() macro for CHM decompression", }, ], }
suse-su-2018:3436-2
Vulnerability from csaf_suse
Published
2019-04-27 14:50
Modified
2019-04-27 14:50
Summary
Security update for clamav
Notes
Title of the patch
Security update for clamav
Description of the patch
This update for clamav fixes the following issues:
clamav was updated to version 0.100.2:
- CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that
could allow an unauthenticated, remote attacker to cause a denial of
service (DoS) condition on an affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded
libmspack. (bsc#1103040)
- Make freshclam more robust against lagging signature mirrors.
- On-Access 'Extra Scanning', an opt-in minor feature of
OnAccess scanning on Linux systems, has been disabled due to a
known issue with resource cleanup OnAccessExtraScanning will
be re-enabled in a future release when the issue is
resolved. In the mean-time, users who enabled the feature in
clamd.conf will see a warning informing them that the feature
is not active. For details, see:
https://bugzilla.clamav.net/show_bug.cgi?id=12048
- Restore exit code compatibility of freshclam with versions before
0.100.0 when the virus database is already up to date
(bsc#1104457).
Patchnames
SUSE-SLE-SAP-12-SP1-2019-1071
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for clamav", title: "Title of the patch", }, { category: "description", text: "This update for clamav fixes the following issues:\n\nclamav was updated to version 0.100.2:\n\n- CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that\n could allow an unauthenticated, remote attacker to cause a denial of\n service (DoS) condition on an affected device. (bsc#1110723)\n- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded\n libmspack. (bsc#1103040)\n\n- Make freshclam more robust against lagging signature mirrors.\n- On-Access 'Extra Scanning', an opt-in minor feature of\n OnAccess scanning on Linux systems, has been disabled due to a\n known issue with resource cleanup OnAccessExtraScanning will\n be re-enabled in a future release when the issue is\n resolved. In the mean-time, users who enabled the feature in\n clamd.conf will see a warning informing them that the feature\n is not active. For details, see:\n https://bugzilla.clamav.net/show_bug.cgi?id=12048\n\n- Restore exit code compatibility of freshclam with versions before\n 0.100.0 when the virus database is already up to date\n (bsc#1104457).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-SAP-12-SP1-2019-1071", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3436-2.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3436-2", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183436-2/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3436-2", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-April/005398.html", }, { category: "self", summary: "SUSE Bug 1103040", url: "https://bugzilla.suse.com/1103040", }, { category: "self", summary: "SUSE Bug 1104457", url: "https://bugzilla.suse.com/1104457", }, { category: "self", summary: "SUSE Bug 1110723", url: "https://bugzilla.suse.com/1110723", }, { category: "self", summary: "SUSE CVE CVE-2018-14680 page", url: "https://www.suse.com/security/cve/CVE-2018-14680/", }, { category: "self", summary: "SUSE CVE CVE-2018-14681 page", url: "https://www.suse.com/security/cve/CVE-2018-14681/", }, { category: "self", summary: "SUSE CVE CVE-2018-14682 page", url: "https://www.suse.com/security/cve/CVE-2018-14682/", }, { category: "self", summary: "SUSE CVE CVE-2018-15378 page", url: "https://www.suse.com/security/cve/CVE-2018-15378/", }, ], title: "Security update for clamav", tracking: { current_release_date: "2019-04-27T14:50:55Z", generator: { date: "2019-04-27T14:50:55Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3436-2", initial_release_date: "2019-04-27T14:50:55Z", revision_history: [ { date: "2019-04-27T14:50:55Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "clamav-0.100.2-33.18.1.x86_64", product: { name: "clamav-0.100.2-33.18.1.x86_64", product_id: "clamav-0.100.2-33.18.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.2-33.18.1.x86_64", }, product_reference: "clamav-0.100.2-33.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2018-14680", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14680", }, ], notes: [ { category: "general", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.2-33.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14680", url: "https://www.suse.com/security/cve/CVE-2018-14680", }, { category: "external", summary: "SUSE Bug 1102922 for CVE-2018-14680", url: "https://bugzilla.suse.com/1102922", }, { category: "external", summary: "SUSE Bug 1103032 for CVE-2018-14680", url: "https://bugzilla.suse.com/1103032", }, { category: "external", summary: "SUSE Bug 1103040 for CVE-2018-14680", url: "https://bugzilla.suse.com/1103040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.2-33.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.2-33.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T14:50:55Z", details: "moderate", }, ], title: "CVE-2018-14680", }, { cve: "CVE-2018-14681", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14681", }, ], notes: [ { category: "general", text: "An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.2-33.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14681", url: "https://www.suse.com/security/cve/CVE-2018-14681", }, { category: "external", summary: "SUSE Bug 1102922 for CVE-2018-14681", url: "https://bugzilla.suse.com/1102922", }, { category: "external", summary: "SUSE Bug 1103032 for CVE-2018-14681", url: "https://bugzilla.suse.com/1103032", }, { category: "external", summary: "SUSE Bug 1103040 for CVE-2018-14681", url: "https://bugzilla.suse.com/1103040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.2-33.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.2-33.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T14:50:55Z", details: "moderate", }, ], title: "CVE-2018-14681", }, { cve: "CVE-2018-14682", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14682", }, ], notes: [ { category: "general", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.2-33.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14682", url: "https://www.suse.com/security/cve/CVE-2018-14682", }, { category: "external", summary: "SUSE Bug 1102922 for CVE-2018-14682", url: "https://bugzilla.suse.com/1102922", }, { category: "external", summary: "SUSE Bug 1103032 for CVE-2018-14682", url: "https://bugzilla.suse.com/1103032", }, { category: "external", summary: "SUSE Bug 1103040 for CVE-2018-14682", url: "https://bugzilla.suse.com/1103040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.2-33.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.2-33.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T14:50:55Z", details: "moderate", }, ], title: "CVE-2018-14682", }, { cve: "CVE-2018-15378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-15378", }, ], notes: [ { category: "general", text: "A vulnerability in ClamAV versions prior to 0.100.2 could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to an error related to the MEW unpacker within the \"unmew11()\" function (libclamav/mew.c), which can be exploited to trigger an invalid read memory access via a specially crafted EXE file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.2-33.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-15378", url: "https://www.suse.com/security/cve/CVE-2018-15378", }, { category: "external", summary: "SUSE Bug 1110723 for CVE-2018-15378", url: "https://bugzilla.suse.com/1110723", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.2-33.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server for SAP Applications 12 SP1:clamav-0.100.2-33.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-04-27T14:50:55Z", details: "moderate", }, ], title: "CVE-2018-15378", }, ], }
suse-su-2018:3441-1
Vulnerability from csaf_suse
Published
2018-10-25 12:35
Modified
2018-10-25 12:35
Summary
Security update for clamav
Notes
Title of the patch
Security update for clamav
Description of the patch
This update for clamav fixes the following issues:
Clamav was updated to version 0.100.2:
- CVE-2018-15378: Vulnerability in ClamAV's MEW
unpacking feature that could allow an unauthenticated, remote
attacker to cause a denial of service (DoS) condition on an
affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682:
more fixes for embedded libmspack. (bsc#1103040)
* Make freshclam more robust against lagging signature mirrors.
* On-Access 'Extra Scanning', an opt-in minor feature of
OnAccess scanning on Linux systems, has been disabled due to a
known issue with resource cleanup OnAccessExtraScanning will
be re-enabled in a future release when the issue is
resolved. In the mean-time, users who enabled the feature in
clamd.conf will see a warning informing them that the feature
is not active. For details, see:
https://bugzilla.clamav.net/show_bug.cgi?id=12048
- Restore exit code compatibility of freshclam with versions before
0.100.0 when the virus database is already up to date
(bsc#1104457).
Patchnames
sleposp3-clamav-13841,slessp3-clamav-13841,slessp4-clamav-13841
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for clamav", title: "Title of the patch", }, { category: "description", text: "This update for clamav fixes the following issues:\n\nClamav was updated to version 0.100.2:\n\n- CVE-2018-15378: Vulnerability in ClamAV's MEW\n unpacking feature that could allow an unauthenticated, remote\n attacker to cause a denial of service (DoS) condition on an\n affected device. (bsc#1110723)\n- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682:\n more fixes for embedded libmspack. (bsc#1103040)\n\n* Make freshclam more robust against lagging signature mirrors.\n* On-Access 'Extra Scanning', an opt-in minor feature of\n OnAccess scanning on Linux systems, has been disabled due to a\n known issue with resource cleanup OnAccessExtraScanning will\n be re-enabled in a future release when the issue is\n resolved. In the mean-time, users who enabled the feature in\n clamd.conf will see a warning informing them that the feature\n is not active. For details, see:\n https://bugzilla.clamav.net/show_bug.cgi?id=12048\n\n- Restore exit code compatibility of freshclam with versions before\n 0.100.0 when the virus database is already up to date\n (bsc#1104457).\n", title: "Description of the patch", }, { category: "details", text: "sleposp3-clamav-13841,slessp3-clamav-13841,slessp4-clamav-13841", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3441-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3441-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183441-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3441-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004791.html", }, { category: "self", summary: "SUSE Bug 1103040", url: "https://bugzilla.suse.com/1103040", }, { category: "self", summary: "SUSE Bug 1104457", url: "https://bugzilla.suse.com/1104457", }, { category: "self", summary: "SUSE Bug 1110723", url: "https://bugzilla.suse.com/1110723", }, { category: "self", summary: "SUSE CVE CVE-2018-14680 page", url: "https://www.suse.com/security/cve/CVE-2018-14680/", }, { category: "self", summary: "SUSE CVE CVE-2018-14681 page", url: "https://www.suse.com/security/cve/CVE-2018-14681/", }, { category: "self", summary: "SUSE CVE CVE-2018-14682 page", url: "https://www.suse.com/security/cve/CVE-2018-14682/", }, { category: "self", summary: "SUSE CVE CVE-2018-15378 page", url: "https://www.suse.com/security/cve/CVE-2018-15378/", }, ], title: "Security update for clamav", tracking: { current_release_date: "2018-10-25T12:35:59Z", generator: { date: "2018-10-25T12:35:59Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3441-1", initial_release_date: "2018-10-25T12:35:59Z", revision_history: [ { date: "2018-10-25T12:35:59Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "clamav-0.100.2-0.20.18.1.i586", product: { name: "clamav-0.100.2-0.20.18.1.i586", product_id: "clamav-0.100.2-0.20.18.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "clamav-0.100.2-0.20.18.1.ia64", product: { name: "clamav-0.100.2-0.20.18.1.ia64", product_id: "clamav-0.100.2-0.20.18.1.ia64", }, }, ], category: "architecture", name: "ia64", }, { branches: [ { category: "product_version", name: "clamav-0.100.2-0.20.18.1.ppc64", product: { name: "clamav-0.100.2-0.20.18.1.ppc64", product_id: "clamav-0.100.2-0.20.18.1.ppc64", }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "clamav-0.100.2-0.20.18.1.s390x", product: { name: "clamav-0.100.2-0.20.18.1.s390x", product_id: "clamav-0.100.2-0.20.18.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "clamav-0.100.2-0.20.18.1.x86_64", product: { name: "clamav-0.100.2-0.20.18.1.x86_64", product_id: "clamav-0.100.2-0.20.18.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Point of Sale 11 SP3", product: { name: "SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-pos:11:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles_ltss:11:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP3-TERADATA", product: { name: "SUSE Linux Enterprise Server 11 SP3-TERADATA", product_id: "SUSE Linux Enterprise Server 11 SP3-TERADATA", product_identification_helper: { cpe: "cpe:/o:suse:sles:11:sp3:teradata", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP4", product: { name: "SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles:11:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:11:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-0.20.18.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", product_id: "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.2-0.20.18.1.i586", }, product_reference: "clamav-0.100.2-0.20.18.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Point of Sale 11 SP3", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-0.20.18.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.i586", }, product_reference: "clamav-0.100.2-0.20.18.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-0.20.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.s390x", }, product_reference: "clamav-0.100.2-0.20.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-0.20.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.x86_64", }, product_reference: "clamav-0.100.2-0.20.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-0.20.18.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", product_id: "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.i586", }, product_reference: "clamav-0.100.2-0.20.18.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-TERADATA", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-0.20.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", product_id: "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.s390x", }, product_reference: "clamav-0.100.2-0.20.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-TERADATA", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-0.20.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", product_id: "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.x86_64", }, product_reference: "clamav-0.100.2-0.20.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP3-TERADATA", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-0.20.18.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.i586", }, product_reference: "clamav-0.100.2-0.20.18.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-0.20.18.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ia64", }, product_reference: "clamav-0.100.2-0.20.18.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-0.20.18.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", }, product_reference: "clamav-0.100.2-0.20.18.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-0.20.18.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.s390x", }, product_reference: "clamav-0.100.2-0.20.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-0.20.18.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", product_id: "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", }, product_reference: "clamav-0.100.2-0.20.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-0.20.18.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.i586", }, product_reference: "clamav-0.100.2-0.20.18.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-0.20.18.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ia64", }, product_reference: "clamav-0.100.2-0.20.18.1.ia64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-0.20.18.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", }, product_reference: "clamav-0.100.2-0.20.18.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-0.20.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.s390x", }, product_reference: "clamav-0.100.2-0.20.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-0.20.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", }, product_reference: "clamav-0.100.2-0.20.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 11 SP4", }, ], }, vulnerabilities: [ { cve: "CVE-2018-14680", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14680", }, ], notes: [ { category: "general", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14680", url: "https://www.suse.com/security/cve/CVE-2018-14680", }, { category: "external", summary: "SUSE Bug 1102922 for CVE-2018-14680", url: "https://bugzilla.suse.com/1102922", }, { category: "external", summary: "SUSE Bug 1103032 for CVE-2018-14680", url: "https://bugzilla.suse.com/1103032", }, { category: "external", summary: "SUSE Bug 1103040 for CVE-2018-14680", url: "https://bugzilla.suse.com/1103040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-25T12:35:59Z", details: "moderate", }, ], title: "CVE-2018-14680", }, { cve: "CVE-2018-14681", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14681", }, ], notes: [ { category: "general", text: "An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14681", url: "https://www.suse.com/security/cve/CVE-2018-14681", }, { category: "external", summary: "SUSE Bug 1102922 for CVE-2018-14681", url: "https://bugzilla.suse.com/1102922", }, { category: "external", summary: "SUSE Bug 1103032 for CVE-2018-14681", url: "https://bugzilla.suse.com/1103032", }, { category: "external", summary: "SUSE Bug 1103040 for CVE-2018-14681", url: "https://bugzilla.suse.com/1103040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-25T12:35:59Z", details: "moderate", }, ], title: "CVE-2018-14681", }, { cve: "CVE-2018-14682", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14682", }, ], notes: [ { category: "general", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14682", url: "https://www.suse.com/security/cve/CVE-2018-14682", }, { category: "external", summary: "SUSE Bug 1102922 for CVE-2018-14682", url: "https://bugzilla.suse.com/1102922", }, { category: "external", summary: "SUSE Bug 1103032 for CVE-2018-14682", url: "https://bugzilla.suse.com/1103032", }, { category: "external", summary: "SUSE Bug 1103040 for CVE-2018-14682", url: "https://bugzilla.suse.com/1103040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-25T12:35:59Z", details: "moderate", }, ], title: "CVE-2018-14682", }, { cve: "CVE-2018-15378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-15378", }, ], notes: [ { category: "general", text: "A vulnerability in ClamAV versions prior to 0.100.2 could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to an error related to the MEW unpacker within the \"unmew11()\" function (libclamav/mew.c), which can be exploited to trigger an invalid read memory access via a specially crafted EXE file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-15378", url: "https://www.suse.com/security/cve/CVE-2018-15378", }, { category: "external", summary: "SUSE Bug 1110723 for CVE-2018-15378", url: "https://bugzilla.suse.com/1110723", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Point of Sale 11 SP3:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:clamav-0.100.2-0.20.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-25T12:35:59Z", details: "moderate", }, ], title: "CVE-2018-15378", }, ], }
suse-su-2018:3250-1
Vulnerability from csaf_suse
Published
2018-10-19 13:06
Modified
2018-10-19 13:06
Summary
Security update for clamav
Notes
Title of the patch
Security update for clamav
Description of the patch
This update for clamav fixes the following issues:
clamav was updated to version 0.100.2.
Following security issues were fixed:
- CVE-2018-15378: Vulnerability in ClamAV's MEW
unpacking feature that could allow an unauthenticated, remote
attacker to cause a denial of service (DoS) condition on an
affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682:
more fixes for embedded libmspack. (bsc#1103040)
Following non-security issues were addressed:
- Make freshclam more robust against lagging signature mirrors.
- On-Access 'Extra Scanning', an opt-in minor feature of
OnAccess scanning on Linux systems, has been disabled due to a
known issue with resource cleanup OnAccessExtraScanning will
be re-enabled in a future release when the issue is
resolved. In the mean-time, users who enabled the feature in
clamd.conf will see a warning informing them that the feature
is not active. For details, see:
https://bugzilla.clamav.net/show_bug.cgi?id=12048
- Restore exit code compatibility of freshclam with versions before
0.100.0 when the virus database is already up to date
(bsc#1104457)
Patchnames
SUSE-SLE-Module-Basesystem-15-2018-2335
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for clamav", title: "Title of the patch", }, { category: "description", text: "This update for clamav fixes the following issues:\n\nclamav was updated to version 0.100.2.\n\nFollowing security issues were fixed:\n\n- CVE-2018-15378: Vulnerability in ClamAV's MEW\n unpacking feature that could allow an unauthenticated, remote\n attacker to cause a denial of service (DoS) condition on an\n affected device. (bsc#1110723)\n- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682:\n more fixes for embedded libmspack. (bsc#1103040)\n\nFollowing non-security issues were addressed:\n\n- Make freshclam more robust against lagging signature mirrors.\n- On-Access 'Extra Scanning', an opt-in minor feature of\n OnAccess scanning on Linux systems, has been disabled due to a\n known issue with resource cleanup OnAccessExtraScanning will\n be re-enabled in a future release when the issue is\n resolved. In the mean-time, users who enabled the feature in\n clamd.conf will see a warning informing them that the feature\n is not active. For details, see:\n https://bugzilla.clamav.net/show_bug.cgi?id=12048\n- Restore exit code compatibility of freshclam with versions before\n 0.100.0 when the virus database is already up to date\n (bsc#1104457)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-Module-Basesystem-15-2018-2335", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3250-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3250-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183250-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3250-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004746.html", }, { category: "self", summary: "SUSE Bug 1103040", url: "https://bugzilla.suse.com/1103040", }, { category: "self", summary: "SUSE Bug 1104457", url: "https://bugzilla.suse.com/1104457", }, { category: "self", summary: "SUSE Bug 1110723", url: "https://bugzilla.suse.com/1110723", }, { category: "self", summary: "SUSE CVE CVE-2018-14680 page", url: "https://www.suse.com/security/cve/CVE-2018-14680/", }, { category: "self", summary: "SUSE CVE CVE-2018-14681 page", url: "https://www.suse.com/security/cve/CVE-2018-14681/", }, { category: "self", summary: "SUSE CVE CVE-2018-14682 page", url: "https://www.suse.com/security/cve/CVE-2018-14682/", }, { category: "self", summary: "SUSE CVE CVE-2018-15378 page", url: "https://www.suse.com/security/cve/CVE-2018-15378/", }, ], title: "Security update for clamav", tracking: { current_release_date: "2018-10-19T13:06:26Z", generator: { date: "2018-10-19T13:06:26Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3250-1", initial_release_date: "2018-10-19T13:06:26Z", revision_history: [ { date: "2018-10-19T13:06:26Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "clamav-0.100.2-3.6.4.aarch64", product: { name: "clamav-0.100.2-3.6.4.aarch64", product_id: "clamav-0.100.2-3.6.4.aarch64", }, }, { category: "product_version", name: "clamav-devel-0.100.2-3.6.4.aarch64", product: { name: "clamav-devel-0.100.2-3.6.4.aarch64", product_id: "clamav-devel-0.100.2-3.6.4.aarch64", }, }, { category: "product_version", name: "libclamav7-0.100.2-3.6.4.aarch64", product: { name: "libclamav7-0.100.2-3.6.4.aarch64", product_id: "libclamav7-0.100.2-3.6.4.aarch64", }, }, { category: "product_version", name: "libclammspack0-0.100.2-3.6.4.aarch64", product: { name: "libclammspack0-0.100.2-3.6.4.aarch64", product_id: "libclammspack0-0.100.2-3.6.4.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "clamav-0.100.2-3.6.4.ppc64le", product: { name: "clamav-0.100.2-3.6.4.ppc64le", product_id: "clamav-0.100.2-3.6.4.ppc64le", }, }, { category: "product_version", name: "clamav-devel-0.100.2-3.6.4.ppc64le", product: { name: "clamav-devel-0.100.2-3.6.4.ppc64le", product_id: "clamav-devel-0.100.2-3.6.4.ppc64le", }, }, { category: "product_version", name: "libclamav7-0.100.2-3.6.4.ppc64le", product: { name: "libclamav7-0.100.2-3.6.4.ppc64le", product_id: "libclamav7-0.100.2-3.6.4.ppc64le", }, }, { category: "product_version", name: "libclammspack0-0.100.2-3.6.4.ppc64le", product: { name: "libclammspack0-0.100.2-3.6.4.ppc64le", product_id: "libclammspack0-0.100.2-3.6.4.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "clamav-0.100.2-3.6.4.s390x", product: { name: "clamav-0.100.2-3.6.4.s390x", product_id: "clamav-0.100.2-3.6.4.s390x", }, }, { category: "product_version", name: "clamav-devel-0.100.2-3.6.4.s390x", product: { name: "clamav-devel-0.100.2-3.6.4.s390x", product_id: "clamav-devel-0.100.2-3.6.4.s390x", }, }, { category: "product_version", name: "libclamav7-0.100.2-3.6.4.s390x", product: { name: "libclamav7-0.100.2-3.6.4.s390x", product_id: "libclamav7-0.100.2-3.6.4.s390x", }, }, { category: "product_version", name: "libclammspack0-0.100.2-3.6.4.s390x", product: { name: "libclammspack0-0.100.2-3.6.4.s390x", product_id: "libclammspack0-0.100.2-3.6.4.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "clamav-0.100.2-3.6.4.x86_64", product: { name: "clamav-0.100.2-3.6.4.x86_64", product_id: "clamav-0.100.2-3.6.4.x86_64", }, }, { category: "product_version", name: "clamav-devel-0.100.2-3.6.4.x86_64", product: { name: "clamav-devel-0.100.2-3.6.4.x86_64", product_id: "clamav-devel-0.100.2-3.6.4.x86_64", }, }, { category: "product_version", name: "libclamav7-0.100.2-3.6.4.x86_64", product: { name: "libclamav7-0.100.2-3.6.4.x86_64", product_id: "libclamav7-0.100.2-3.6.4.x86_64", }, }, { category: "product_version", name: "libclammspack0-0.100.2-3.6.4.x86_64", product: { name: "libclammspack0-0.100.2-3.6.4.x86_64", product_id: "libclammspack0-0.100.2-3.6.4.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15", product: { name: "SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-3.6.4.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.aarch64", }, product_reference: "clamav-0.100.2-3.6.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-3.6.4.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.ppc64le", }, product_reference: "clamav-0.100.2-3.6.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-3.6.4.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.s390x", }, product_reference: "clamav-0.100.2-3.6.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-3.6.4.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.x86_64", }, product_reference: "clamav-0.100.2-3.6.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.100.2-3.6.4.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.aarch64", }, product_reference: "clamav-devel-0.100.2-3.6.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.100.2-3.6.4.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.ppc64le", }, product_reference: "clamav-devel-0.100.2-3.6.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.100.2-3.6.4.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.s390x", }, product_reference: "clamav-devel-0.100.2-3.6.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.100.2-3.6.4.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.x86_64", }, product_reference: "clamav-devel-0.100.2-3.6.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libclamav7-0.100.2-3.6.4.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.aarch64", }, product_reference: "libclamav7-0.100.2-3.6.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libclamav7-0.100.2-3.6.4.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.ppc64le", }, product_reference: "libclamav7-0.100.2-3.6.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libclamav7-0.100.2-3.6.4.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.s390x", }, product_reference: "libclamav7-0.100.2-3.6.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libclamav7-0.100.2-3.6.4.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.x86_64", }, product_reference: "libclamav7-0.100.2-3.6.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libclammspack0-0.100.2-3.6.4.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.aarch64", }, product_reference: "libclammspack0-0.100.2-3.6.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libclammspack0-0.100.2-3.6.4.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.ppc64le", }, product_reference: "libclammspack0-0.100.2-3.6.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libclammspack0-0.100.2-3.6.4.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.s390x", }, product_reference: "libclammspack0-0.100.2-3.6.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libclammspack0-0.100.2-3.6.4.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.x86_64", }, product_reference: "libclammspack0-0.100.2-3.6.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, ], }, vulnerabilities: [ { cve: "CVE-2018-14680", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14680", }, ], notes: [ { category: "general", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14680", url: "https://www.suse.com/security/cve/CVE-2018-14680", }, { category: "external", summary: "SUSE Bug 1102922 for CVE-2018-14680", url: "https://bugzilla.suse.com/1102922", }, { category: "external", summary: "SUSE Bug 1103032 for CVE-2018-14680", url: "https://bugzilla.suse.com/1103032", }, { category: "external", summary: "SUSE Bug 1103040 for CVE-2018-14680", url: "https://bugzilla.suse.com/1103040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-19T13:06:26Z", details: "moderate", }, ], title: "CVE-2018-14680", }, { cve: "CVE-2018-14681", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14681", }, ], notes: [ { category: "general", text: "An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14681", url: "https://www.suse.com/security/cve/CVE-2018-14681", }, { category: "external", summary: "SUSE Bug 1102922 for CVE-2018-14681", url: "https://bugzilla.suse.com/1102922", }, { category: "external", summary: "SUSE Bug 1103032 for CVE-2018-14681", url: "https://bugzilla.suse.com/1103032", }, { category: "external", summary: "SUSE Bug 1103040 for CVE-2018-14681", url: "https://bugzilla.suse.com/1103040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-19T13:06:26Z", details: "moderate", }, ], title: "CVE-2018-14681", }, { cve: "CVE-2018-14682", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14682", }, ], notes: [ { category: "general", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14682", url: "https://www.suse.com/security/cve/CVE-2018-14682", }, { category: "external", summary: "SUSE Bug 1102922 for CVE-2018-14682", url: "https://bugzilla.suse.com/1102922", }, { category: "external", summary: "SUSE Bug 1103032 for CVE-2018-14682", url: "https://bugzilla.suse.com/1103032", }, { category: "external", summary: "SUSE Bug 1103040 for CVE-2018-14682", url: "https://bugzilla.suse.com/1103040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-19T13:06:26Z", details: "moderate", }, ], title: "CVE-2018-14682", }, { cve: "CVE-2018-15378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-15378", }, ], notes: [ { category: "general", text: "A vulnerability in ClamAV versions prior to 0.100.2 could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to an error related to the MEW unpacker within the \"unmew11()\" function (libclamav/mew.c), which can be exploited to trigger an invalid read memory access via a specially crafted EXE file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-15378", url: "https://www.suse.com/security/cve/CVE-2018-15378", }, { category: "external", summary: "SUSE Bug 1110723 for CVE-2018-15378", url: "https://bugzilla.suse.com/1110723", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:clamav-devel-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclamav7-0.100.2-3.6.4.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libclammspack0-0.100.2-3.6.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-19T13:06:26Z", details: "moderate", }, ], title: "CVE-2018-15378", }, ], }
suse-su-2018:3436-1
Vulnerability from csaf_suse
Published
2018-10-25 12:35
Modified
2018-10-25 12:35
Summary
Security update for clamav
Notes
Title of the patch
Security update for clamav
Description of the patch
This update for clamav fixes the following issues:
clamav was updated to version 0.100.2:
- CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that
could allow an unauthenticated, remote attacker to cause a denial of
service (DoS) condition on an affected device. (bsc#1110723)
- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded
libmspack. (bsc#1103040)
- Make freshclam more robust against lagging signature mirrors.
- On-Access 'Extra Scanning', an opt-in minor feature of
OnAccess scanning on Linux systems, has been disabled due to a
known issue with resource cleanup OnAccessExtraScanning will
be re-enabled in a future release when the issue is
resolved. In the mean-time, users who enabled the feature in
clamd.conf will see a warning informing them that the feature
is not active. For details, see:
https://bugzilla.clamav.net/show_bug.cgi?id=12048
- Restore exit code compatibility of freshclam with versions before
0.100.0 when the virus database is already up to date
(bsc#1104457).
Patchnames
SUSE-OpenStack-Cloud-7-2018-2460,SUSE-SLE-DESKTOP-12-SP3-2018-2460,SUSE-SLE-SAP-12-SP2-2018-2460,SUSE-SLE-SERVER-12-2018-2460,SUSE-SLE-SERVER-12-SP1-2018-2460,SUSE-SLE-SERVER-12-SP2-2018-2460,SUSE-SLE-SERVER-12-SP2-BCL-2018-2460,SUSE-SLE-SERVER-12-SP3-2018-2460,SUSE-Storage-4-2018-2460
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for clamav", title: "Title of the patch", }, { category: "description", text: "This update for clamav fixes the following issues:\n\nclamav was updated to version 0.100.2:\n\n- CVE-2018-15378: Vulnerability in ClamAV's MEW unpacking feature that\n could allow an unauthenticated, remote attacker to cause a denial of\n service (DoS) condition on an affected device. (bsc#1110723)\n- CVE-2018-14680, CVE-2018-14681, CVE-2018-14682: more fixes for embedded\n libmspack. (bsc#1103040)\n\n- Make freshclam more robust against lagging signature mirrors.\n- On-Access 'Extra Scanning', an opt-in minor feature of\n OnAccess scanning on Linux systems, has been disabled due to a\n known issue with resource cleanup OnAccessExtraScanning will\n be re-enabled in a future release when the issue is\n resolved. In the mean-time, users who enabled the feature in\n clamd.conf will see a warning informing them that the feature\n is not active. For details, see:\n https://bugzilla.clamav.net/show_bug.cgi?id=12048\n\n- Restore exit code compatibility of freshclam with versions before\n 0.100.0 when the virus database is already up to date\n (bsc#1104457).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-OpenStack-Cloud-7-2018-2460,SUSE-SLE-DESKTOP-12-SP3-2018-2460,SUSE-SLE-SAP-12-SP2-2018-2460,SUSE-SLE-SERVER-12-2018-2460,SUSE-SLE-SERVER-12-SP1-2018-2460,SUSE-SLE-SERVER-12-SP2-2018-2460,SUSE-SLE-SERVER-12-SP2-BCL-2018-2460,SUSE-SLE-SERVER-12-SP3-2018-2460,SUSE-Storage-4-2018-2460", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_3436-1.json", }, { category: "self", summary: "URL for SUSE-SU-2018:3436-1", url: "https://www.suse.com/support/update/announcement/2018/suse-su-20183436-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2018:3436-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2018-October/004789.html", }, { category: "self", summary: "SUSE Bug 1103040", url: "https://bugzilla.suse.com/1103040", }, { category: "self", summary: "SUSE Bug 1104457", url: "https://bugzilla.suse.com/1104457", }, { category: "self", summary: "SUSE Bug 1110723", url: "https://bugzilla.suse.com/1110723", }, { category: "self", summary: "SUSE CVE CVE-2018-14680 page", url: "https://www.suse.com/security/cve/CVE-2018-14680/", }, { category: "self", summary: "SUSE CVE CVE-2018-14681 page", url: "https://www.suse.com/security/cve/CVE-2018-14681/", }, { category: "self", summary: "SUSE CVE CVE-2018-14682 page", url: "https://www.suse.com/security/cve/CVE-2018-14682/", }, { category: "self", summary: "SUSE CVE CVE-2018-15378 page", url: "https://www.suse.com/security/cve/CVE-2018-15378/", }, ], title: "Security update for clamav", tracking: { current_release_date: "2018-10-25T12:35:15Z", generator: { date: "2018-10-25T12:35:15Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2018:3436-1", initial_release_date: "2018-10-25T12:35:15Z", revision_history: [ { date: "2018-10-25T12:35:15Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "clamav-0.100.2-33.18.1.aarch64", product: { name: "clamav-0.100.2-33.18.1.aarch64", product_id: "clamav-0.100.2-33.18.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "clamav-0.100.2-33.18.1.ppc64le", product: { name: "clamav-0.100.2-33.18.1.ppc64le", product_id: "clamav-0.100.2-33.18.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "clamav-0.100.2-33.18.1.s390x", product: { name: "clamav-0.100.2-33.18.1.s390x", product_id: "clamav-0.100.2-33.18.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "clamav-0.100.2-33.18.1.x86_64", product: { name: "clamav-0.100.2-33.18.1.x86_64", product_id: "clamav-0.100.2-33.18.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 7", product: { name: "SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:7", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP3", product: { name: "SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12-LTSS", product: { name: "SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3", product: { name: "SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 4", product: { name: "SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4", product_identification_helper: { cpe: "cpe:/o:suse:ses:4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.s390x", }, product_reference: "clamav-0.100.2-33.18.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.x86_64", }, product_reference: "clamav-0.100.2-33.18.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:clamav-0.100.2-33.18.1.x86_64", }, product_reference: "clamav-0.100.2-33.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.ppc64le", }, product_reference: "clamav-0.100.2-33.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.x86_64", }, product_reference: "clamav-0.100.2-33.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.ppc64le", }, product_reference: "clamav-0.100.2-33.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.s390x", }, product_reference: "clamav-0.100.2-33.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.x86_64", }, product_reference: "clamav-0.100.2-33.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.ppc64le", }, product_reference: "clamav-0.100.2-33.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.s390x", }, product_reference: "clamav-0.100.2-33.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.x86_64", }, product_reference: "clamav-0.100.2-33.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.ppc64le", }, product_reference: "clamav-0.100.2-33.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.s390x", }, product_reference: "clamav-0.100.2-33.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.x86_64", }, product_reference: "clamav-0.100.2-33.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.2-33.18.1.x86_64", }, product_reference: "clamav-0.100.2-33.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.aarch64", }, product_reference: "clamav-0.100.2-33.18.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.ppc64le", }, product_reference: "clamav-0.100.2-33.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.s390x", }, product_reference: "clamav-0.100.2-33.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.x86_64", }, product_reference: "clamav-0.100.2-33.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.aarch64", }, product_reference: "clamav-0.100.2-33.18.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.ppc64le", }, product_reference: "clamav-0.100.2-33.18.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.s390x", }, product_reference: "clamav-0.100.2-33.18.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.x86_64", }, product_reference: "clamav-0.100.2-33.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "clamav-0.100.2-33.18.1.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:clamav-0.100.2-33.18.1.x86_64", }, product_reference: "clamav-0.100.2-33.18.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, ], }, vulnerabilities: [ { cve: "CVE-2018-14680", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14680", }, ], notes: [ { category: "general", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.s390x", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14680", url: "https://www.suse.com/security/cve/CVE-2018-14680", }, { category: "external", summary: "SUSE Bug 1102922 for CVE-2018-14680", url: "https://bugzilla.suse.com/1102922", }, { category: "external", summary: "SUSE Bug 1103032 for CVE-2018-14680", url: "https://bugzilla.suse.com/1103032", }, { category: "external", summary: "SUSE Bug 1103040 for CVE-2018-14680", url: "https://bugzilla.suse.com/1103040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.s390x", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.s390x", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-25T12:35:15Z", details: "moderate", }, ], title: "CVE-2018-14680", }, { cve: "CVE-2018-14681", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14681", }, ], notes: [ { category: "general", text: "An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.s390x", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14681", url: "https://www.suse.com/security/cve/CVE-2018-14681", }, { category: "external", summary: "SUSE Bug 1102922 for CVE-2018-14681", url: "https://bugzilla.suse.com/1102922", }, { category: "external", summary: "SUSE Bug 1103032 for CVE-2018-14681", url: "https://bugzilla.suse.com/1103032", }, { category: "external", summary: "SUSE Bug 1103040 for CVE-2018-14681", url: "https://bugzilla.suse.com/1103040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.s390x", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.s390x", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-25T12:35:15Z", details: "moderate", }, ], title: "CVE-2018-14681", }, { cve: "CVE-2018-14682", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14682", }, ], notes: [ { category: "general", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.s390x", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14682", url: "https://www.suse.com/security/cve/CVE-2018-14682", }, { category: "external", summary: "SUSE Bug 1102922 for CVE-2018-14682", url: "https://bugzilla.suse.com/1102922", }, { category: "external", summary: "SUSE Bug 1103032 for CVE-2018-14682", url: "https://bugzilla.suse.com/1103032", }, { category: "external", summary: "SUSE Bug 1103040 for CVE-2018-14682", url: "https://bugzilla.suse.com/1103040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.s390x", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.s390x", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-25T12:35:15Z", details: "moderate", }, ], title: "CVE-2018-14682", }, { cve: "CVE-2018-15378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-15378", }, ], notes: [ { category: "general", text: "A vulnerability in ClamAV versions prior to 0.100.2 could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to an error related to the MEW unpacker within the \"unmew11()\" function (libclamav/mew.c), which can be exploited to trigger an invalid read memory access via a specially crafted EXE file.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.s390x", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-15378", url: "https://www.suse.com/security/cve/CVE-2018-15378", }, { category: "external", summary: "SUSE Bug 1110723 for CVE-2018-15378", url: "https://bugzilla.suse.com/1110723", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.s390x", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:clamav-0.100.2-33.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:clamav-0.100.2-33.18.1.x86_64", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.s390x", "SUSE OpenStack Cloud 7:clamav-0.100.2-33.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2018-10-25T12:35:15Z", details: "moderate", }, ], title: "CVE-2018-15378", }, ], }
opensuse-su-2024:10958-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
libmspack-devel-0.10.1-1.12 on GA media
Notes
Title of the patch
libmspack-devel-0.10.1-1.12 on GA media
Description of the patch
These are all security issues fixed in the libmspack-devel-0.10.1-1.12 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10958
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "libmspack-devel-0.10.1-1.12 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the libmspack-devel-0.10.1-1.12 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10958", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10958-1.json", }, { category: "self", summary: "SUSE CVE CVE-2017-11423 page", url: "https://www.suse.com/security/cve/CVE-2017-11423/", }, { category: "self", summary: "SUSE CVE CVE-2017-6419 page", url: "https://www.suse.com/security/cve/CVE-2017-6419/", }, { category: "self", summary: "SUSE CVE CVE-2018-14679 page", url: "https://www.suse.com/security/cve/CVE-2018-14679/", }, { category: "self", summary: "SUSE CVE CVE-2018-14680 page", url: "https://www.suse.com/security/cve/CVE-2018-14680/", }, { category: "self", summary: "SUSE CVE CVE-2018-14681 page", url: "https://www.suse.com/security/cve/CVE-2018-14681/", }, { category: "self", summary: "SUSE CVE CVE-2018-14682 page", url: "https://www.suse.com/security/cve/CVE-2018-14682/", }, ], title: "libmspack-devel-0.10.1-1.12 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10958-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libmspack-devel-0.10.1-1.12.aarch64", product: { name: "libmspack-devel-0.10.1-1.12.aarch64", product_id: "libmspack-devel-0.10.1-1.12.aarch64", }, }, { category: "product_version", name: "libmspack0-0.10.1-1.12.aarch64", product: { name: "libmspack0-0.10.1-1.12.aarch64", product_id: "libmspack0-0.10.1-1.12.aarch64", }, }, { category: "product_version", name: "libmspack0-32bit-0.10.1-1.12.aarch64", product: { name: "libmspack0-32bit-0.10.1-1.12.aarch64", product_id: "libmspack0-32bit-0.10.1-1.12.aarch64", }, }, { category: "product_version", name: "mspack-examples-0.10.1-1.12.aarch64", product: { name: "mspack-examples-0.10.1-1.12.aarch64", product_id: "mspack-examples-0.10.1-1.12.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libmspack-devel-0.10.1-1.12.ppc64le", product: { name: "libmspack-devel-0.10.1-1.12.ppc64le", product_id: "libmspack-devel-0.10.1-1.12.ppc64le", }, }, { category: "product_version", name: "libmspack0-0.10.1-1.12.ppc64le", product: { name: "libmspack0-0.10.1-1.12.ppc64le", product_id: "libmspack0-0.10.1-1.12.ppc64le", }, }, { category: "product_version", name: "libmspack0-32bit-0.10.1-1.12.ppc64le", product: { name: "libmspack0-32bit-0.10.1-1.12.ppc64le", product_id: "libmspack0-32bit-0.10.1-1.12.ppc64le", }, }, { category: "product_version", name: "mspack-examples-0.10.1-1.12.ppc64le", product: { name: "mspack-examples-0.10.1-1.12.ppc64le", product_id: "mspack-examples-0.10.1-1.12.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libmspack-devel-0.10.1-1.12.s390x", product: { name: "libmspack-devel-0.10.1-1.12.s390x", product_id: "libmspack-devel-0.10.1-1.12.s390x", }, }, { category: "product_version", name: "libmspack0-0.10.1-1.12.s390x", product: { name: "libmspack0-0.10.1-1.12.s390x", product_id: "libmspack0-0.10.1-1.12.s390x", }, }, { category: "product_version", name: "libmspack0-32bit-0.10.1-1.12.s390x", product: { name: "libmspack0-32bit-0.10.1-1.12.s390x", product_id: "libmspack0-32bit-0.10.1-1.12.s390x", }, }, { category: "product_version", name: "mspack-examples-0.10.1-1.12.s390x", product: { name: "mspack-examples-0.10.1-1.12.s390x", product_id: "mspack-examples-0.10.1-1.12.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libmspack-devel-0.10.1-1.12.x86_64", product: { name: "libmspack-devel-0.10.1-1.12.x86_64", product_id: "libmspack-devel-0.10.1-1.12.x86_64", }, }, { category: "product_version", name: "libmspack0-0.10.1-1.12.x86_64", product: { name: "libmspack0-0.10.1-1.12.x86_64", product_id: "libmspack0-0.10.1-1.12.x86_64", }, }, { category: "product_version", name: "libmspack0-32bit-0.10.1-1.12.x86_64", product: { name: "libmspack0-32bit-0.10.1-1.12.x86_64", product_id: "libmspack0-32bit-0.10.1-1.12.x86_64", }, }, { category: "product_version", name: "mspack-examples-0.10.1-1.12.x86_64", product: { name: "mspack-examples-0.10.1-1.12.x86_64", product_id: "mspack-examples-0.10.1-1.12.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libmspack-devel-0.10.1-1.12.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.aarch64", }, product_reference: "libmspack-devel-0.10.1-1.12.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0.10.1-1.12.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.ppc64le", }, product_reference: "libmspack-devel-0.10.1-1.12.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0.10.1-1.12.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.s390x", }, product_reference: "libmspack-devel-0.10.1-1.12.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libmspack-devel-0.10.1-1.12.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.x86_64", }, product_reference: "libmspack-devel-0.10.1-1.12.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libmspack0-0.10.1-1.12.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.aarch64", }, product_reference: "libmspack0-0.10.1-1.12.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libmspack0-0.10.1-1.12.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.ppc64le", }, product_reference: "libmspack0-0.10.1-1.12.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libmspack0-0.10.1-1.12.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.s390x", }, product_reference: "libmspack0-0.10.1-1.12.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libmspack0-0.10.1-1.12.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.x86_64", }, product_reference: "libmspack0-0.10.1-1.12.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libmspack0-32bit-0.10.1-1.12.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.aarch64", }, product_reference: "libmspack0-32bit-0.10.1-1.12.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libmspack0-32bit-0.10.1-1.12.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.ppc64le", }, product_reference: "libmspack0-32bit-0.10.1-1.12.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libmspack0-32bit-0.10.1-1.12.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.s390x", }, product_reference: "libmspack0-32bit-0.10.1-1.12.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libmspack0-32bit-0.10.1-1.12.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.x86_64", }, product_reference: "libmspack0-32bit-0.10.1-1.12.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "mspack-examples-0.10.1-1.12.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.aarch64", }, product_reference: "mspack-examples-0.10.1-1.12.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "mspack-examples-0.10.1-1.12.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.ppc64le", }, product_reference: "mspack-examples-0.10.1-1.12.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "mspack-examples-0.10.1-1.12.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.s390x", }, product_reference: "mspack-examples-0.10.1-1.12.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "mspack-examples-0.10.1-1.12.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.x86_64", }, product_reference: "mspack-examples-0.10.1-1.12.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2017-11423", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-11423", }, ], notes: [ { category: "general", text: "The cabd_read_string function in mspack/cabd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2 and other products, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted CAB file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.s390x", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-11423", url: "https://www.suse.com/security/cve/CVE-2017-11423", }, { category: "external", summary: "SUSE Bug 1049423 for CVE-2017-11423", url: "https://bugzilla.suse.com/1049423", }, { category: "external", summary: "SUSE Bug 1083915 for CVE-2017-11423", url: "https://bugzilla.suse.com/1083915", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.s390x", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.s390x", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-11423", }, { cve: "CVE-2017-6419", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6419", }, ], notes: [ { category: "general", text: "mspack/lzxd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted CHM file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.s390x", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6419", url: "https://www.suse.com/security/cve/CVE-2017-6419", }, { category: "external", summary: "SUSE Bug 1052449 for CVE-2017-6419", url: "https://bugzilla.suse.com/1052449", }, { category: "external", summary: "SUSE Bug 1083915 for CVE-2017-6419", url: "https://bugzilla.suse.com/1083915", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.s390x", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.s390x", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-6419", }, { cve: "CVE-2018-14679", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14679", }, ], notes: [ { category: "general", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service (uninitialized data dereference and application crash).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.s390x", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14679", url: "https://www.suse.com/security/cve/CVE-2018-14679", }, { category: "external", summary: "SUSE Bug 1102922 for CVE-2018-14679", url: "https://bugzilla.suse.com/1102922", }, { category: "external", summary: "SUSE Bug 1103032 for CVE-2018-14679", url: "https://bugzilla.suse.com/1103032", }, { category: "external", summary: "SUSE Bug 1103040 for CVE-2018-14679", url: "https://bugzilla.suse.com/1103040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.s390x", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.s390x", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14679", }, { cve: "CVE-2018-14680", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14680", }, ], notes: [ { category: "general", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.s390x", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14680", url: "https://www.suse.com/security/cve/CVE-2018-14680", }, { category: "external", summary: "SUSE Bug 1102922 for CVE-2018-14680", url: "https://bugzilla.suse.com/1102922", }, { category: "external", summary: "SUSE Bug 1103032 for CVE-2018-14680", url: "https://bugzilla.suse.com/1103032", }, { category: "external", summary: "SUSE Bug 1103040 for CVE-2018-14680", url: "https://bugzilla.suse.com/1103040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.s390x", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.s390x", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14680", }, { cve: "CVE-2018-14681", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14681", }, ], notes: [ { category: "general", text: "An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.s390x", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14681", url: "https://www.suse.com/security/cve/CVE-2018-14681", }, { category: "external", summary: "SUSE Bug 1102922 for CVE-2018-14681", url: "https://bugzilla.suse.com/1102922", }, { category: "external", summary: "SUSE Bug 1103032 for CVE-2018-14681", url: "https://bugzilla.suse.com/1103032", }, { category: "external", summary: "SUSE Bug 1103040 for CVE-2018-14681", url: "https://bugzilla.suse.com/1103040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.s390x", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.s390x", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14681", }, { cve: "CVE-2018-14682", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14682", }, ], notes: [ { category: "general", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.s390x", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14682", url: "https://www.suse.com/security/cve/CVE-2018-14682", }, { category: "external", summary: "SUSE Bug 1102922 for CVE-2018-14682", url: "https://bugzilla.suse.com/1102922", }, { category: "external", summary: "SUSE Bug 1103032 for CVE-2018-14682", url: "https://bugzilla.suse.com/1103032", }, { category: "external", summary: "SUSE Bug 1103040 for CVE-2018-14682", url: "https://bugzilla.suse.com/1103040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.s390x", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack-devel-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.s390x", "openSUSE Tumbleweed:libmspack0-32bit-0.10.1-1.12.x86_64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.aarch64", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.ppc64le", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.s390x", "openSUSE Tumbleweed:mspack-examples-0.10.1-1.12.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14682", }, ], }
opensuse-su-2024:10685-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
clamav-0.103.3-1.4 on GA media
Notes
Title of the patch
clamav-0.103.3-1.4 on GA media
Description of the patch
These are all security issues fixed in the clamav-0.103.3-1.4 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10685
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "clamav-0.103.3-1.4 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the clamav-0.103.3-1.4 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-10685", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10685-1.json", }, { category: "self", summary: "SUSE CVE CVE-2005-3239 page", url: "https://www.suse.com/security/cve/CVE-2005-3239/", }, { category: "self", summary: "SUSE CVE CVE-2005-3303 page", url: "https://www.suse.com/security/cve/CVE-2005-3303/", }, { category: "self", summary: "SUSE CVE CVE-2006-1614 page", url: "https://www.suse.com/security/cve/CVE-2006-1614/", }, { category: "self", summary: "SUSE CVE CVE-2006-1989 page", url: "https://www.suse.com/security/cve/CVE-2006-1989/", }, { category: "self", summary: "SUSE CVE CVE-2006-4182 page", url: "https://www.suse.com/security/cve/CVE-2006-4182/", }, { category: "self", summary: "SUSE CVE CVE-2006-5874 page", url: "https://www.suse.com/security/cve/CVE-2006-5874/", }, { category: "self", summary: "SUSE CVE CVE-2007-0897 page", url: "https://www.suse.com/security/cve/CVE-2007-0897/", }, { category: "self", summary: "SUSE CVE CVE-2007-0898 page", url: "https://www.suse.com/security/cve/CVE-2007-0898/", }, { category: "self", summary: "SUSE CVE CVE-2007-1745 page", url: "https://www.suse.com/security/cve/CVE-2007-1745/", }, { category: "self", summary: "SUSE CVE CVE-2007-1997 page", url: "https://www.suse.com/security/cve/CVE-2007-1997/", }, { category: "self", summary: "SUSE CVE CVE-2007-6335 page", url: "https://www.suse.com/security/cve/CVE-2007-6335/", }, { category: "self", summary: "SUSE CVE CVE-2007-6336 page", url: "https://www.suse.com/security/cve/CVE-2007-6336/", }, { category: "self", summary: "SUSE CVE CVE-2007-6337 page", url: "https://www.suse.com/security/cve/CVE-2007-6337/", }, { category: "self", summary: "SUSE CVE CVE-2007-6595 page", url: "https://www.suse.com/security/cve/CVE-2007-6595/", }, { category: "self", summary: "SUSE CVE CVE-2007-6596 page", url: "https://www.suse.com/security/cve/CVE-2007-6596/", }, { category: "self", summary: "SUSE CVE CVE-2008-0318 page", url: "https://www.suse.com/security/cve/CVE-2008-0318/", }, { category: "self", summary: "SUSE CVE CVE-2008-0728 page", url: "https://www.suse.com/security/cve/CVE-2008-0728/", }, { category: "self", summary: "SUSE CVE CVE-2008-1100 page", url: "https://www.suse.com/security/cve/CVE-2008-1100/", }, { category: "self", summary: "SUSE CVE CVE-2008-2713 page", url: "https://www.suse.com/security/cve/CVE-2008-2713/", }, { category: "self", summary: "SUSE CVE CVE-2010-1205 page", url: "https://www.suse.com/security/cve/CVE-2010-1205/", }, { category: "self", summary: "SUSE CVE CVE-2012-6706 page", url: "https://www.suse.com/security/cve/CVE-2012-6706/", }, { category: "self", summary: "SUSE CVE CVE-2017-11423 page", url: "https://www.suse.com/security/cve/CVE-2017-11423/", }, { category: "self", summary: "SUSE CVE CVE-2017-12374 page", url: "https://www.suse.com/security/cve/CVE-2017-12374/", }, { category: "self", summary: "SUSE CVE CVE-2017-12375 page", url: "https://www.suse.com/security/cve/CVE-2017-12375/", }, { category: "self", summary: "SUSE CVE CVE-2017-12376 page", url: "https://www.suse.com/security/cve/CVE-2017-12376/", }, { category: "self", summary: "SUSE CVE CVE-2017-12377 page", url: "https://www.suse.com/security/cve/CVE-2017-12377/", }, { category: "self", summary: "SUSE CVE CVE-2017-12378 page", url: "https://www.suse.com/security/cve/CVE-2017-12378/", }, { category: "self", summary: "SUSE CVE CVE-2017-12379 page", url: "https://www.suse.com/security/cve/CVE-2017-12379/", }, { category: "self", summary: "SUSE CVE CVE-2017-12380 page", url: "https://www.suse.com/security/cve/CVE-2017-12380/", }, { category: "self", summary: "SUSE CVE CVE-2017-6418 page", url: "https://www.suse.com/security/cve/CVE-2017-6418/", }, { category: "self", summary: "SUSE CVE CVE-2017-6419 page", url: "https://www.suse.com/security/cve/CVE-2017-6419/", }, { category: "self", summary: "SUSE CVE CVE-2017-6420 page", url: "https://www.suse.com/security/cve/CVE-2017-6420/", }, { category: "self", summary: "SUSE CVE CVE-2018-0202 page", url: "https://www.suse.com/security/cve/CVE-2018-0202/", }, { category: "self", summary: "SUSE CVE CVE-2018-0360 page", url: "https://www.suse.com/security/cve/CVE-2018-0360/", }, { category: "self", summary: "SUSE CVE CVE-2018-0361 page", url: "https://www.suse.com/security/cve/CVE-2018-0361/", }, { category: "self", summary: "SUSE CVE CVE-2018-1000085 page", url: "https://www.suse.com/security/cve/CVE-2018-1000085/", }, { category: "self", summary: "SUSE CVE CVE-2018-14680 page", url: "https://www.suse.com/security/cve/CVE-2018-14680/", }, { category: "self", summary: "SUSE CVE CVE-2018-15378 page", url: "https://www.suse.com/security/cve/CVE-2018-15378/", }, { category: "self", summary: "SUSE CVE CVE-2019-12625 page", url: "https://www.suse.com/security/cve/CVE-2019-12625/", }, { category: "self", summary: "SUSE CVE CVE-2019-12900 page", url: "https://www.suse.com/security/cve/CVE-2019-12900/", }, { category: "self", summary: "SUSE CVE CVE-2019-15961 page", url: "https://www.suse.com/security/cve/CVE-2019-15961/", }, { category: "self", summary: "SUSE CVE CVE-2019-1785 page", url: "https://www.suse.com/security/cve/CVE-2019-1785/", }, { category: "self", summary: "SUSE CVE CVE-2019-1786 page", url: "https://www.suse.com/security/cve/CVE-2019-1786/", }, { category: "self", summary: "SUSE CVE CVE-2019-1787 page", url: "https://www.suse.com/security/cve/CVE-2019-1787/", }, { category: "self", summary: "SUSE CVE CVE-2019-1788 page", url: "https://www.suse.com/security/cve/CVE-2019-1788/", }, { category: "self", summary: "SUSE CVE CVE-2019-1789 page", url: "https://www.suse.com/security/cve/CVE-2019-1789/", }, { category: "self", summary: "SUSE CVE CVE-2019-1798 page", url: "https://www.suse.com/security/cve/CVE-2019-1798/", }, { category: "self", summary: "SUSE CVE CVE-2020-3123 page", url: "https://www.suse.com/security/cve/CVE-2020-3123/", }, { category: "self", summary: "SUSE CVE CVE-2020-3327 page", url: "https://www.suse.com/security/cve/CVE-2020-3327/", }, { category: "self", summary: "SUSE CVE CVE-2020-3341 page", url: "https://www.suse.com/security/cve/CVE-2020-3341/", }, { category: "self", summary: "SUSE CVE CVE-2020-3350 page", url: "https://www.suse.com/security/cve/CVE-2020-3350/", }, { category: "self", summary: "SUSE CVE CVE-2020-3481 page", url: "https://www.suse.com/security/cve/CVE-2020-3481/", }, { category: "self", summary: "SUSE CVE CVE-2021-1252 page", url: "https://www.suse.com/security/cve/CVE-2021-1252/", }, { category: "self", summary: "SUSE CVE CVE-2021-1404 page", url: "https://www.suse.com/security/cve/CVE-2021-1404/", }, { category: "self", summary: "SUSE CVE CVE-2021-1405 page", url: "https://www.suse.com/security/cve/CVE-2021-1405/", }, ], title: "clamav-0.103.3-1.4 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:10685-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "clamav-0.103.3-1.4.aarch64", product: { name: "clamav-0.103.3-1.4.aarch64", product_id: "clamav-0.103.3-1.4.aarch64", }, }, { category: "product_version", name: "clamav-devel-0.103.3-1.4.aarch64", product: { name: "clamav-devel-0.103.3-1.4.aarch64", product_id: "clamav-devel-0.103.3-1.4.aarch64", }, }, { category: "product_version", name: "clamav-milter-0.103.3-1.4.aarch64", product: { name: "clamav-milter-0.103.3-1.4.aarch64", product_id: "clamav-milter-0.103.3-1.4.aarch64", }, }, { category: "product_version", name: "libclamav9-0.103.3-1.4.aarch64", product: { name: "libclamav9-0.103.3-1.4.aarch64", product_id: "libclamav9-0.103.3-1.4.aarch64", }, }, { category: "product_version", name: "libfreshclam2-0.103.3-1.4.aarch64", product: { name: "libfreshclam2-0.103.3-1.4.aarch64", product_id: "libfreshclam2-0.103.3-1.4.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "clamav-0.103.3-1.4.ppc64le", product: { name: "clamav-0.103.3-1.4.ppc64le", product_id: "clamav-0.103.3-1.4.ppc64le", }, }, { category: "product_version", name: "clamav-devel-0.103.3-1.4.ppc64le", product: { name: "clamav-devel-0.103.3-1.4.ppc64le", product_id: "clamav-devel-0.103.3-1.4.ppc64le", }, }, { category: "product_version", name: "clamav-milter-0.103.3-1.4.ppc64le", product: { name: "clamav-milter-0.103.3-1.4.ppc64le", product_id: "clamav-milter-0.103.3-1.4.ppc64le", }, }, { category: "product_version", name: "libclamav9-0.103.3-1.4.ppc64le", product: { name: "libclamav9-0.103.3-1.4.ppc64le", product_id: "libclamav9-0.103.3-1.4.ppc64le", }, }, { category: "product_version", name: "libfreshclam2-0.103.3-1.4.ppc64le", product: { name: "libfreshclam2-0.103.3-1.4.ppc64le", product_id: "libfreshclam2-0.103.3-1.4.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "clamav-0.103.3-1.4.s390x", product: { name: "clamav-0.103.3-1.4.s390x", product_id: "clamav-0.103.3-1.4.s390x", }, }, { category: "product_version", name: "clamav-devel-0.103.3-1.4.s390x", product: { name: "clamav-devel-0.103.3-1.4.s390x", product_id: "clamav-devel-0.103.3-1.4.s390x", }, }, { category: "product_version", name: "clamav-milter-0.103.3-1.4.s390x", product: { name: "clamav-milter-0.103.3-1.4.s390x", product_id: "clamav-milter-0.103.3-1.4.s390x", }, }, { category: "product_version", name: "libclamav9-0.103.3-1.4.s390x", product: { name: "libclamav9-0.103.3-1.4.s390x", product_id: "libclamav9-0.103.3-1.4.s390x", }, }, { category: "product_version", name: "libfreshclam2-0.103.3-1.4.s390x", product: { name: "libfreshclam2-0.103.3-1.4.s390x", product_id: "libfreshclam2-0.103.3-1.4.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "clamav-0.103.3-1.4.x86_64", product: { name: "clamav-0.103.3-1.4.x86_64", product_id: "clamav-0.103.3-1.4.x86_64", }, }, { category: "product_version", name: "clamav-devel-0.103.3-1.4.x86_64", product: { name: "clamav-devel-0.103.3-1.4.x86_64", product_id: "clamav-devel-0.103.3-1.4.x86_64", }, }, { category: "product_version", name: "clamav-milter-0.103.3-1.4.x86_64", product: { name: "clamav-milter-0.103.3-1.4.x86_64", product_id: "clamav-milter-0.103.3-1.4.x86_64", }, }, { category: "product_version", name: "libclamav9-0.103.3-1.4.x86_64", product: { name: "libclamav9-0.103.3-1.4.x86_64", product_id: "libclamav9-0.103.3-1.4.x86_64", }, }, { category: "product_version", name: "libfreshclam2-0.103.3-1.4.x86_64", product: { name: "libfreshclam2-0.103.3-1.4.x86_64", product_id: "libfreshclam2-0.103.3-1.4.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "clamav-0.103.3-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", }, product_reference: "clamav-0.103.3-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.3-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", }, product_reference: "clamav-0.103.3-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.3-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", }, product_reference: "clamav-0.103.3-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-0.103.3-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", }, product_reference: "clamav-0.103.3-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.3-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", }, product_reference: "clamav-devel-0.103.3-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.3-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", }, product_reference: "clamav-devel-0.103.3-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.3-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", }, product_reference: "clamav-devel-0.103.3-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-devel-0.103.3-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", }, product_reference: "clamav-devel-0.103.3-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-milter-0.103.3-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", }, product_reference: "clamav-milter-0.103.3-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-milter-0.103.3-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", }, product_reference: "clamav-milter-0.103.3-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-milter-0.103.3-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", }, product_reference: "clamav-milter-0.103.3-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "clamav-milter-0.103.3-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", }, product_reference: "clamav-milter-0.103.3-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.3-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", }, product_reference: "libclamav9-0.103.3-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.3-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", }, product_reference: "libclamav9-0.103.3-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.3-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", }, product_reference: "libclamav9-0.103.3-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libclamav9-0.103.3-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", }, product_reference: "libclamav9-0.103.3-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.3-1.4.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", }, product_reference: "libfreshclam2-0.103.3-1.4.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.3-1.4.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", }, product_reference: "libfreshclam2-0.103.3-1.4.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.3-1.4.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", }, product_reference: "libfreshclam2-0.103.3-1.4.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libfreshclam2-0.103.3-1.4.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", }, product_reference: "libfreshclam2-0.103.3-1.4.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2005-3239", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2005-3239", }, ], notes: [ { category: "general", text: "The OLE2 unpacker in clamd in Clam AntiVirus (ClamAV) 0.87-1 allows remote attackers to cause a denial of service (segmentation fault) via a DOC file with an invalid property tree, which triggers an infinite recursion in the ole2_walk_property_tree function.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2005-3239", url: "https://www.suse.com/security/cve/CVE-2005-3239", }, { category: "external", summary: "SUSE Bug 132305 for CVE-2005-3239", url: "https://bugzilla.suse.com/132305", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2005-3239", }, { cve: "CVE-2005-3303", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2005-3303", }, ], notes: [ { category: "general", text: "The FSG unpacker (fsg.c) in Clam AntiVirus (ClamAV) 0.80 through 0.87 allows remote attackers to cause \"memory corruption\" and execute arbitrary code via a crafted FSG 1.33 file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2005-3303", url: "https://www.suse.com/security/cve/CVE-2005-3303", }, { category: "external", summary: "SUSE Bug 132305 for CVE-2005-3303", url: "https://bugzilla.suse.com/132305", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2005-3303", }, { cve: "CVE-2006-1614", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2006-1614", }, ], notes: [ { category: "general", text: "Integer overflow in the cli_scanpe function in the PE header parser (libclamav/pe.c) in Clam AntiVirus (ClamAV) before 0.88.1, when ArchiveMaxFileSize is disabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2006-1614", url: "https://www.suse.com/security/cve/CVE-2006-1614", }, { category: "external", summary: "SUSE Bug 164039 for CVE-2006-1614", url: "https://bugzilla.suse.com/164039", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2006-1614", }, { cve: "CVE-2006-1989", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2006-1989", }, ], notes: [ { category: "general", text: "Buffer overflow in the get_database function in the HTTP client in Freshclam in ClamAV 0.80 to 0.88.1 might allow remote web servers to execute arbitrary code via long HTTP headers.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2006-1989", url: "https://www.suse.com/security/cve/CVE-2006-1989", }, { category: "external", summary: "SUSE Bug 171496 for CVE-2006-1989", url: "https://bugzilla.suse.com/171496", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2006-1989", }, { cve: "CVE-2006-4182", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2006-4182", }, ], notes: [ { category: "general", text: "Integer overflow in ClamAV 0.88.1 and 0.88.4, and other versions before 0.88.5, allows remote attackers to cause a denial of service (scanning service crash) and execute arbitrary code via a crafted Portable Executable (PE) file that leads to a heap-based buffer overflow when less memory is allocated than expected.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2006-4182", url: "https://www.suse.com/security/cve/CVE-2006-4182", }, { category: "external", summary: "SUSE Bug 212898 for CVE-2006-4182", url: "https://bugzilla.suse.com/212898", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2006-4182", }, { cve: "CVE-2006-5874", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2006-5874", }, ], notes: [ { category: "general", text: "Clam AntiVirus (ClamAV) 0.88 and earlier allows remote attackers to cause a denial of service (crash) via a malformed base64-encoded MIME attachment that triggers a null pointer dereference.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2006-5874", url: "https://www.suse.com/security/cve/CVE-2006-5874", }, { category: "external", summary: "SUSE Bug 227827 for CVE-2006-5874", url: "https://bugzilla.suse.com/227827", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2006-5874", }, { cve: "CVE-2007-0897", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-0897", }, ], notes: [ { category: "general", text: "Clam AntiVirus ClamAV before 0.90 does not close open file descriptors under certain conditions, which allows remote attackers to cause a denial of service (file descriptor consumption and failed scans) via CAB archives with a cabinet header record length of zero, which causes a function to return without closing a file descriptor.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-0897", url: "https://www.suse.com/security/cve/CVE-2007-0897", }, { category: "external", summary: "SUSE Bug 246214 for CVE-2007-0897", url: "https://bugzilla.suse.com/246214", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2007-0897", }, { cve: "CVE-2007-0898", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-0898", }, ], notes: [ { category: "general", text: "Directory traversal vulnerability in clamd in Clam AntiVirus ClamAV before 0.90 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the id MIME header parameter in a multi-part message.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-0898", url: "https://www.suse.com/security/cve/CVE-2007-0898", }, { category: "external", summary: "SUSE Bug 246214 for CVE-2007-0898", url: "https://bugzilla.suse.com/246214", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2007-0898", }, { cve: "CVE-2007-1745", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-1745", }, ], notes: [ { category: "general", text: "The chm_decompress_stream function in libclamav/chmunpack.c in Clam AntiVirus (ClamAV) before 0.90.2 leaks file descriptors, which has unknown impact and attack vectors involving a crafted CHM file, a different vulnerability than CVE-2007-0897. NOTE: some of these details are obtained from third party information.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-1745", url: "https://www.suse.com/security/cve/CVE-2007-1745", }, { category: "external", summary: "SUSE Bug 264189 for CVE-2007-1745", url: "https://bugzilla.suse.com/264189", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2007-1745", }, { cve: "CVE-2007-1997", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-1997", }, ], notes: [ { category: "general", text: "Integer signedness error in the (1) cab_unstore and (2) cab_extract functions in libclamav/cab.c in Clam AntiVirus (ClamAV) before 0.90.2 allow remote attackers to execute arbitrary code via a crafted CHM file that contains a negative integer, which passes a signed comparison and leads to a stack-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-1997", url: "https://www.suse.com/security/cve/CVE-2007-1997", }, { category: "external", summary: "SUSE Bug 264189 for CVE-2007-1997", url: "https://bugzilla.suse.com/264189", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2007-1997", }, { cve: "CVE-2007-6335", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-6335", }, ], notes: [ { category: "general", text: "Integer overflow in libclamav in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MEW packed PE file, which triggers a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-6335", url: "https://www.suse.com/security/cve/CVE-2007-6335", }, { category: "external", summary: "SUSE Bug 343277 for CVE-2007-6335", url: "https://bugzilla.suse.com/343277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2007-6335", }, { cve: "CVE-2007-6336", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-6336", }, ], notes: [ { category: "general", text: "Off-by-one error in ClamAV before 0.92 allows remote attackers to execute arbitrary code via a crafted MS-ZIP compressed CAB file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-6336", url: "https://www.suse.com/security/cve/CVE-2007-6336", }, { category: "external", summary: "SUSE Bug 343277 for CVE-2007-6336", url: "https://bugzilla.suse.com/343277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2007-6336", }, { cve: "CVE-2007-6337", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-6337", }, ], notes: [ { category: "general", text: "Unspecified vulnerability in the bzip2 decompression algorithm in nsis/bzlib_private.h in ClamAV before 0.92 has unknown impact and remote attack vectors.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-6337", url: "https://www.suse.com/security/cve/CVE-2007-6337", }, { category: "external", summary: "SUSE Bug 343277 for CVE-2007-6337", url: "https://bugzilla.suse.com/343277", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2007-6337", }, { cve: "CVE-2007-6595", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-6595", }, ], notes: [ { category: "general", text: "ClamAV 0.92 allows local users to overwrite arbitrary files via a symlink attack on (1) temporary files used by the cli_gentempfd function in libclamav/others.c or on (2) .ascii files used by sigtool, when utf16-decode is enabled.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-6595", url: "https://www.suse.com/security/cve/CVE-2007-6595", }, { category: "external", summary: "SUSE Bug 350987 for CVE-2007-6595", url: "https://bugzilla.suse.com/350987", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2007-6595", }, { cve: "CVE-2007-6596", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2007-6596", }, ], notes: [ { category: "general", text: "ClamAV 0.92 does not recognize Base64 UUEncoded archives, which allows remote attackers to bypass the scanner via a Base64-UUEncoded file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2007-6596", url: "https://www.suse.com/security/cve/CVE-2007-6596", }, { category: "external", summary: "SUSE Bug 350987 for CVE-2007-6596", url: "https://bugzilla.suse.com/350987", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2007-6596", }, { cve: "CVE-2008-0318", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-0318", }, ], notes: [ { category: "general", text: "Integer overflow in the cli_scanpe function in libclamav in ClamAV before 0.92.1, as used in clamd, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Petite packed PE file, which triggers a heap-based buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-0318", url: "https://www.suse.com/security/cve/CVE-2008-0318", }, { category: "external", summary: "SUSE Bug 361374 for CVE-2008-0318", url: "https://bugzilla.suse.com/361374", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2008-0318", }, { cve: "CVE-2008-0728", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-0728", }, ], notes: [ { category: "general", text: "The unmew11 function in libclamav/mew.c in libclamav in ClamAV before 0.92.1 has unknown impact and attack vectors that trigger \"heap corruption.\"", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-0728", url: "https://www.suse.com/security/cve/CVE-2008-0728", }, { category: "external", summary: "SUSE Bug 361403 for CVE-2008-0728", url: "https://bugzilla.suse.com/361403", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2008-0728", }, { cve: "CVE-2008-1100", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-1100", }, ], notes: [ { category: "general", text: "Buffer overflow in the cli_scanpe function in libclamav (libclamav/pe.c) for ClamAV 0.92 and 0.92.1 allows remote attackers to execute arbitrary code via a crafted Upack PE file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-1100", url: "https://www.suse.com/security/cve/CVE-2008-1100", }, { category: "external", summary: "SUSE Bug 368963 for CVE-2008-1100", url: "https://bugzilla.suse.com/368963", }, { category: "external", summary: "SUSE Bug 379695 for CVE-2008-1100", url: "https://bugzilla.suse.com/379695", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2008-1100", }, { cve: "CVE-2008-2713", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2008-2713", }, ], notes: [ { category: "general", text: "libclamav/petite.c in ClamAV before 0.93.1 allows remote attackers to cause a denial of service via a crafted Petite file that triggers an out-of-bounds read.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2008-2713", url: "https://www.suse.com/security/cve/CVE-2008-2713", }, { category: "external", summary: "SUSE Bug 399302 for CVE-2008-2713", url: "https://bugzilla.suse.com/399302", }, { category: "external", summary: "SUSE Bug 406994 for CVE-2008-2713", url: "https://bugzilla.suse.com/406994", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2008-2713", }, { cve: "CVE-2010-1205", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2010-1205", }, ], notes: [ { category: "general", text: "Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2010-1205", url: "https://www.suse.com/security/cve/CVE-2010-1205", }, { category: "external", summary: "SUSE Bug 1188284 for CVE-2010-1205", url: "https://bugzilla.suse.com/1188284", }, { category: "external", summary: "SUSE Bug 617866 for CVE-2010-1205", url: "https://bugzilla.suse.com/617866", }, { category: "external", summary: "SUSE Bug 622506 for CVE-2010-1205", url: "https://bugzilla.suse.com/622506", }, { category: "external", summary: "SUSE Bug 639941 for CVE-2010-1205", url: "https://bugzilla.suse.com/639941", }, { category: "external", summary: "SUSE Bug 854395 for CVE-2010-1205", url: "https://bugzilla.suse.com/854395", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2010-1205", }, { cve: "CVE-2012-6706", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2012-6706", }, ], notes: [ { category: "general", text: "A VMSF_DELTA memory corruption was discovered in unrar before 5.5.5, as used in Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other products, that can lead to arbitrary code execution. An integer overflow can be caused in DataSize+CurChannel. The result is a negative value of the \"DestPos\" variable, which allows the attacker to write out of bounds when setting Mem[DestPos].", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2012-6706", url: "https://www.suse.com/security/cve/CVE-2012-6706", }, { category: "external", summary: "SUSE Bug 1045315 for CVE-2012-6706", url: "https://bugzilla.suse.com/1045315", }, { category: "external", summary: "SUSE Bug 1045490 for CVE-2012-6706", url: "https://bugzilla.suse.com/1045490", }, { category: "external", summary: "SUSE Bug 1053919 for CVE-2012-6706", url: "https://bugzilla.suse.com/1053919", }, { category: "external", summary: "SUSE Bug 1083915 for CVE-2012-6706", url: "https://bugzilla.suse.com/1083915", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2012-6706", }, { cve: "CVE-2017-11423", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-11423", }, ], notes: [ { category: "general", text: "The cabd_read_string function in mspack/cabd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2 and other products, allows remote attackers to cause a denial of service (stack-based buffer over-read and application crash) via a crafted CAB file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-11423", url: "https://www.suse.com/security/cve/CVE-2017-11423", }, { category: "external", summary: "SUSE Bug 1049423 for CVE-2017-11423", url: "https://bugzilla.suse.com/1049423", }, { category: "external", summary: "SUSE Bug 1083915 for CVE-2017-11423", url: "https://bugzilla.suse.com/1083915", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-11423", }, { cve: "CVE-2017-12374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12374", }, ], notes: [ { category: "general", text: "The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing operations (mbox.c operations on bounce messages). If successfully exploited, the ClamAV software could allow a variable pointing to the mail body which could cause a used after being free (use-after-free) instance which may lead to a disruption of services on an affected device to include a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12374", url: "https://www.suse.com/security/cve/CVE-2017-12374", }, { category: "external", summary: "SUSE Bug 1077732 for CVE-2017-12374", url: "https://bugzilla.suse.com/1077732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-12374", }, { cve: "CVE-2017-12375", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12375", }, ], notes: [ { category: "general", text: "The ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of input validation checking mechanisms during certain mail parsing functions (the rfc2047 function in mbox.c). An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12375", url: "https://www.suse.com/security/cve/CVE-2017-12375", }, { category: "external", summary: "SUSE Bug 1077732 for CVE-2017-12375", url: "https://bugzilla.suse.com/1077732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-12375", }, { cve: "CVE-2017-12376", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12376", }, ], notes: [ { category: "general", text: "ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause a handle_pdfname (in pdf.c) buffer overflow when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12376", url: "https://www.suse.com/security/cve/CVE-2017-12376", }, { category: "external", summary: "SUSE Bug 1077732 for CVE-2017-12376", url: "https://bugzilla.suse.com/1077732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-12376", }, { cve: "CVE-2017-12377", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12377", }, ], notes: [ { category: "general", text: "ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in mew packet files sent to an affected device. A successful exploit could cause a heap-based buffer over-read condition in mew.c when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition or potentially execute arbitrary code on the affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12377", url: "https://www.suse.com/security/cve/CVE-2017-12377", }, { category: "external", summary: "SUSE Bug 1077732 for CVE-2017-12377", url: "https://bugzilla.suse.com/1077732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-12377", }, { cve: "CVE-2017-12378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12378", }, ], notes: [ { category: "general", text: "ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms of .tar (Tape Archive) files sent to an affected device. A successful exploit could cause a checksum buffer over-read condition when ClamAV scans the malicious .tar file, potentially allowing the attacker to cause a DoS condition on the affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12378", url: "https://www.suse.com/security/cve/CVE-2017-12378", }, { category: "external", summary: "SUSE Bug 1077732 for CVE-2017-12378", url: "https://bugzilla.suse.com/1077732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-12378", }, { cve: "CVE-2017-12379", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12379", }, ], notes: [ { category: "general", text: "ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or potentially execute arbitrary code on an affected device. The vulnerability is due to improper input validation checking mechanisms in the message parsing function on an affected system. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. This action could cause a messageAddArgument (in message.c) buffer overflow condition when ClamAV scans the malicious email, allowing the attacker to potentially cause a DoS condition or execute arbitrary code on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12379", url: "https://www.suse.com/security/cve/CVE-2017-12379", }, { category: "external", summary: "SUSE Bug 1077732 for CVE-2017-12379", url: "https://bugzilla.suse.com/1077732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-12379", }, { cve: "CVE-2017-12380", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-12380", }, ], notes: [ { category: "general", text: "ClamAV AntiVirus software versions 0.99.2 and prior contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms in mbox.c during certain mail parsing functions of the ClamAV software. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted email to the affected device. An exploit could trigger a NULL pointer dereference condition when ClamAV scans the malicious email, which may result in a DoS condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-12380", url: "https://www.suse.com/security/cve/CVE-2017-12380", }, { category: "external", summary: "SUSE Bug 1077732 for CVE-2017-12380", url: "https://bugzilla.suse.com/1077732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-12380", }, { cve: "CVE-2017-6418", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6418", }, ], notes: [ { category: "general", text: "libclamav/message.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted e-mail message.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6418", url: "https://www.suse.com/security/cve/CVE-2017-6418", }, { category: "external", summary: "SUSE Bug 1052466 for CVE-2017-6418", url: "https://bugzilla.suse.com/1052466", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-6418", }, { cve: "CVE-2017-6419", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6419", }, ], notes: [ { category: "general", text: "mspack/lzxd.c in libmspack 0.5alpha, as used in ClamAV 0.99.2, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted CHM file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6419", url: "https://www.suse.com/security/cve/CVE-2017-6419", }, { category: "external", summary: "SUSE Bug 1052449 for CVE-2017-6419", url: "https://bugzilla.suse.com/1052449", }, { category: "external", summary: "SUSE Bug 1083915 for CVE-2017-6419", url: "https://bugzilla.suse.com/1083915", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-6419", }, { cve: "CVE-2017-6420", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-6420", }, ], notes: [ { category: "general", text: "The wwunpack function in libclamav/wwunpack.c in ClamAV 0.99.2 allows remote attackers to cause a denial of service (use-after-free) via a crafted PE file with WWPack compression.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-6420", url: "https://www.suse.com/security/cve/CVE-2017-6420", }, { category: "external", summary: "SUSE Bug 1052448 for CVE-2017-6420", url: "https://bugzilla.suse.com/1052448", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-6420", }, { cve: "CVE-2018-0202", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-0202", }, ], notes: [ { category: "general", text: "clamscan in ClamAV before 0.99.4 contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation checking mechanisms when handling Portable Document Format (.pdf) files sent to an affected device. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted .pdf file to an affected device. This action could cause an out-of-bounds read when ClamAV scans the malicious file, allowing the attacker to cause a DoS condition. This concerns pdf_parse_array and pdf_parse_string in libclamav/pdfng.c. Cisco Bug IDs: CSCvh91380, CSCvh91400.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-0202", url: "https://www.suse.com/security/cve/CVE-2018-0202", }, { category: "external", summary: "SUSE Bug 1083915 for CVE-2018-0202", url: "https://bugzilla.suse.com/1083915", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-0202", }, { cve: "CVE-2018-0360", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-0360", }, ], notes: [ { category: "general", text: "ClamAV before 0.100.1 has an HWP integer overflow with a resultant infinite loop via a crafted Hangul Word Processor file. This is in parsehwp3_paragraph() in libclamav/hwp.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-0360", url: "https://www.suse.com/security/cve/CVE-2018-0360", }, { category: "external", summary: "SUSE Bug 1101410 for CVE-2018-0360", url: "https://bugzilla.suse.com/1101410", }, { category: "external", summary: "SUSE Bug 1103091 for CVE-2018-0360", url: "https://bugzilla.suse.com/1103091", }, { category: "external", summary: "SUSE Bug 1103092 for CVE-2018-0360", url: "https://bugzilla.suse.com/1103092", }, { category: "external", summary: "SUSE Bug 1103099 for CVE-2018-0360", url: "https://bugzilla.suse.com/1103099", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-0360", }, { cve: "CVE-2018-0361", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-0361", }, ], notes: [ { category: "general", text: "ClamAV before 0.100.1 lacks a PDF object length check, resulting in an unreasonably long time to parse a relatively small file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-0361", url: "https://www.suse.com/security/cve/CVE-2018-0361", }, { category: "external", summary: "SUSE Bug 1101410 for CVE-2018-0361", url: "https://bugzilla.suse.com/1101410", }, { category: "external", summary: "SUSE Bug 1101412 for CVE-2018-0361", url: "https://bugzilla.suse.com/1101412", }, { category: "external", summary: "SUSE Bug 1103091 for CVE-2018-0361", url: "https://bugzilla.suse.com/1103091", }, { category: "external", summary: "SUSE Bug 1103092 for CVE-2018-0361", url: "https://bugzilla.suse.com/1103092", }, { category: "external", summary: "SUSE Bug 1103099 for CVE-2018-0361", url: "https://bugzilla.suse.com/1103099", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-0361", }, { cve: "CVE-2018-1000085", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-1000085", }, ], notes: [ { category: "general", text: "ClamAV version version 0.99.3 contains a Out of bounds heap memory read vulnerability in XAR parser, function xar_hash_check() that can result in Leaking of memory, may help in developing exploit chains.. This attack appear to be exploitable via The victim must scan a crafted XAR file. This vulnerability appears to have been fixed in after commit d96a6b8bcc7439fa7e3876207aa0a8e79c8451b6.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-1000085", url: "https://www.suse.com/security/cve/CVE-2018-1000085", }, { category: "external", summary: "SUSE Bug 1082858 for CVE-2018-1000085", url: "https://bugzilla.suse.com/1082858", }, { category: "external", summary: "SUSE Bug 1083915 for CVE-2018-1000085", url: "https://bugzilla.suse.com/1083915", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-1000085", }, { cve: "CVE-2018-14680", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-14680", }, ], notes: [ { category: "general", text: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-14680", url: "https://www.suse.com/security/cve/CVE-2018-14680", }, { category: "external", summary: "SUSE Bug 1102922 for CVE-2018-14680", url: "https://bugzilla.suse.com/1102922", }, { category: "external", summary: "SUSE Bug 1103032 for CVE-2018-14680", url: "https://bugzilla.suse.com/1103032", }, { category: "external", summary: "SUSE Bug 1103040 for CVE-2018-14680", url: "https://bugzilla.suse.com/1103040", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-14680", }, { cve: "CVE-2018-15378", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-15378", }, ], notes: [ { category: "general", text: "A vulnerability in ClamAV versions prior to 0.100.2 could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to an error related to the MEW unpacker within the \"unmew11()\" function (libclamav/mew.c), which can be exploited to trigger an invalid read memory access via a specially crafted EXE file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-15378", url: "https://www.suse.com/security/cve/CVE-2018-15378", }, { category: "external", summary: "SUSE Bug 1110723 for CVE-2018-15378", url: "https://bugzilla.suse.com/1110723", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-15378", }, { cve: "CVE-2019-12625", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12625", }, ], notes: [ { category: "general", text: "ClamAV versions prior to 0.101.3 are susceptible to a zip bomb vulnerability where an unauthenticated attacker can cause a denial of service condition by sending crafted messages to an affected system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12625", url: "https://www.suse.com/security/cve/CVE-2019-12625", }, { category: "external", summary: "SUSE Bug 1144504 for CVE-2019-12625", url: "https://bugzilla.suse.com/1144504", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-12625", }, { cve: "CVE-2019-12900", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-12900", }, ], notes: [ { category: "general", text: "BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-12900", url: "https://www.suse.com/security/cve/CVE-2019-12900", }, { category: "external", summary: "SUSE Bug 1139083 for CVE-2019-12900", url: "https://bugzilla.suse.com/1139083", }, { category: "external", summary: "SUSE Bug 1141513 for CVE-2019-12900", url: "https://bugzilla.suse.com/1141513", }, { category: "external", summary: "SUSE Bug 1149458 for CVE-2019-12900", url: "https://bugzilla.suse.com/1149458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-12900", }, { cve: "CVE-2019-15961", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-15961", }, ], notes: [ { category: "general", text: "A vulnerability in the email parsing module Clam AntiVirus (ClamAV) Software versions 0.102.0, 0.101.4 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to inefficient MIME parsing routines that result in extremely long scan times of specially formatted email files. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to scan the crafted email file indefinitely, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-15961", url: "https://www.suse.com/security/cve/CVE-2019-15961", }, { category: "external", summary: "SUSE Bug 1157763 for CVE-2019-15961", url: "https://bugzilla.suse.com/1157763", }, { category: "external", summary: "SUSE Bug 1180082 for CVE-2019-15961", url: "https://bugzilla.suse.com/1180082", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-15961", }, { cve: "CVE-2019-1785", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1785", }, ], notes: [ { category: "general", text: "A vulnerability in the RAR file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper error-handling mechanisms when processing nested RAR files sent to an affected device. An attacker could exploit this vulnerability by sending a crafted RAR file to an affected device. An exploit could allow the attacker to view or create arbitrary files on the targeted system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1785", url: "https://www.suse.com/security/cve/CVE-2019-1785", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1785", url: "https://bugzilla.suse.com/1130721", }, { category: "external", summary: "SUSE Bug 1137508 for CVE-2019-1785", url: "https://bugzilla.suse.com/1137508", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-1785", }, { cve: "CVE-2019-1786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1786", }, ], notes: [ { category: "general", text: "A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1786", url: "https://www.suse.com/security/cve/CVE-2019-1786", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1786", url: "https://bugzilla.suse.com/1130721", }, { category: "external", summary: "SUSE Bug 1137510 for CVE-2019-1786", url: "https://bugzilla.suse.com/1137510", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-1786", }, { cve: "CVE-2019-1787", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1787", }, ], notes: [ { category: "general", text: "A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1787", url: "https://www.suse.com/security/cve/CVE-2019-1787", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1787", url: "https://bugzilla.suse.com/1130721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-1787", }, { cve: "CVE-2019-1788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1788", }, ], notes: [ { category: "general", text: "A vulnerability in the Object Linking & Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1788", url: "https://www.suse.com/security/cve/CVE-2019-1788", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1788", url: "https://bugzilla.suse.com/1130721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.2, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-1788", }, { cve: "CVE-2019-1789", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1789", }, ], notes: [ { category: "general", text: "ClamAV versions prior to 0.101.2 are susceptible to a denial of service (DoS) vulnerability. An out-of-bounds heap read condition may occur when scanning PE files. An example is Windows EXE and DLL files that have been packed using Aspack as a result of inadequate bound-checking.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1789", url: "https://www.suse.com/security/cve/CVE-2019-1789", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1789", url: "https://bugzilla.suse.com/1130721", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-1789", }, { cve: "CVE-2019-1798", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-1798", }, ], notes: [ { category: "general", text: "A vulnerability in the Portable Executable (PE) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for PE files sent an affected device. An attacker could exploit this vulnerability by sending malformed PE files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-1798", url: "https://www.suse.com/security/cve/CVE-2019-1798", }, { category: "external", summary: "SUSE Bug 1130721 for CVE-2019-1798", url: "https://bugzilla.suse.com/1130721", }, { category: "external", summary: "SUSE Bug 1137513 for CVE-2019-1798", url: "https://bugzilla.suse.com/1137513", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-1798", }, { cve: "CVE-2020-3123", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3123", }, ], notes: [ { category: "general", text: "A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiVirus (ClamAV) Software versions 0.102.1 and 0.102.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to an out-of-bounds read affecting users that have enabled the optional DLP feature. An attacker could exploit this vulnerability by sending a crafted email file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3123", url: "https://www.suse.com/security/cve/CVE-2020-3123", }, { category: "external", summary: "SUSE Bug 1162921 for CVE-2020-3123", url: "https://bugzilla.suse.com/1162921", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-3123", }, { cve: "CVE-2020-3327", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3327", }, ], notes: [ { category: "general", text: "A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3327", url: "https://www.suse.com/security/cve/CVE-2020-3327", }, { category: "external", summary: "SUSE Bug 1171980 for CVE-2020-3327", url: "https://bugzilla.suse.com/1171980", }, { category: "external", summary: "SUSE Bug 1174250 for CVE-2020-3327", url: "https://bugzilla.suse.com/1174250", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-3327", }, { cve: "CVE-2020-3341", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3341", }, ], notes: [ { category: "general", text: "A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3341", url: "https://www.suse.com/security/cve/CVE-2020-3341", }, { category: "external", summary: "SUSE Bug 1171981 for CVE-2020-3341", url: "https://bugzilla.suse.com/1171981", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-3341", }, { cve: "CVE-2020-3350", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3350", }, ], notes: [ { category: "general", text: "A vulnerability in the endpoint software of Cisco AMP for Endpoints and Clam AntiVirus could allow an authenticated, local attacker to cause the running software to delete arbitrary files on the system. The vulnerability is due to a race condition that could occur when scanning malicious files. An attacker with local shell access could exploit this vulnerability by executing a script that could trigger the race condition. A successful exploit could allow the attacker to delete arbitrary files on the system that the attacker would not normally have privileges to delete, producing system instability or causing the endpoint software to stop working.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3350", url: "https://www.suse.com/security/cve/CVE-2020-3350", }, { category: "external", summary: "SUSE Bug 1174250 for CVE-2020-3350", url: "https://bugzilla.suse.com/1174250", }, { category: "external", summary: "SUSE Bug 1174255 for CVE-2020-3350", url: "https://bugzilla.suse.com/1174255", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-3350", }, { cve: "CVE-2020-3481", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-3481", }, ], notes: [ { category: "general", text: "A vulnerability in the EGG archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.0 - 0.102.3 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a null pointer dereference. An attacker could exploit this vulnerability by sending a crafted EGG file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-3481", url: "https://www.suse.com/security/cve/CVE-2020-3481", }, { category: "external", summary: "SUSE Bug 1174250 for CVE-2020-3481", url: "https://bugzilla.suse.com/1174250", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-3481", }, { cve: "CVE-2021-1252", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-1252", }, ], notes: [ { category: "general", text: "A vulnerability in the Excel XLM macro parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper error handling that may result in an infinite loop. An attacker could exploit this vulnerability by sending a crafted Excel file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process hang, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-1252", url: "https://www.suse.com/security/cve/CVE-2021-1252", }, { category: "external", summary: "SUSE Bug 1184532 for CVE-2021-1252", url: "https://bugzilla.suse.com/1184532", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-1252", }, { cve: "CVE-2021-1404", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-1404", }, ], notes: [ { category: "general", text: "A vulnerability in the PDF parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper buffer size tracking that may result in a heap buffer over-read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-1404", url: "https://www.suse.com/security/cve/CVE-2021-1404", }, { category: "external", summary: "SUSE Bug 1184533 for CVE-2021-1404", url: "https://bugzilla.suse.com/1184533", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-1404", }, { cve: "CVE-2021-1405", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-1405", }, ], notes: [ { category: "general", text: "A vulnerability in the email parsing module in Clam AntiVirus (ClamAV) Software version 0.103.1 and all prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper variable initialization that may result in an NULL pointer read. An attacker could exploit this vulnerability by sending a crafted email to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-1405", url: "https://www.suse.com/security/cve/CVE-2021-1405", }, { category: "external", summary: "SUSE Bug 1184534 for CVE-2021-1405", url: "https://bugzilla.suse.com/1184534", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:clamav-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-devel-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.s390x", "openSUSE Tumbleweed:clamav-milter-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libclamav9-0.103.3-1.4.x86_64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.aarch64", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.ppc64le", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.s390x", "openSUSE Tumbleweed:libfreshclam2-0.103.3-1.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2021-1405", }, ], }
gsd-2018-14680
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.
Aliases
Aliases
{ GSD: { alias: "CVE-2018-14680", description: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.", id: "GSD-2018-14680", references: [ "https://www.suse.com/security/cve/CVE-2018-14680.html", "https://www.debian.org/security/2018/dsa-4260", "https://access.redhat.com/errata/RHSA-2018:3327", "https://ubuntu.com/security/CVE-2018-14680", "https://advisories.mageia.org/CVE-2018-14680.html", "https://alas.aws.amazon.com/cve/html/CVE-2018-14680.html", "https://linux.oracle.com/cve/CVE-2018-14680.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2018-14680", ], details: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.", id: "GSD-2018-14680", modified: "2023-12-13T01:22:38.558253Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14680", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "USN-3728-3", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3728-3/", }, { name: "DSA-4260", refsource: "DEBIAN", url: "https://www.debian.org/security/2018/dsa-4260", }, { name: "[debian-lts-announce] 20180806 [SECURITY] [DLA-1460-1] libmspack security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00007.html", }, { name: "https://bugs.debian.org/904801", refsource: "MISC", url: "https://bugs.debian.org/904801", }, { name: "https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a", refsource: "MISC", url: "https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a", }, { name: "http://www.openwall.com/lists/oss-security/2018/07/26/1", refsource: "MISC", url: "http://www.openwall.com/lists/oss-security/2018/07/26/1", }, { name: "RHSA-2018:3505", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3505", }, { name: "USN-3789-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3789-2/", }, { name: "USN-3728-2", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3728-2/", }, { name: "1041410", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1041410", }, { name: "USN-3728-1", refsource: "UBUNTU", url: "https://usn.ubuntu.com/3728-1/", }, { name: "RHSA-2018:3327", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2018:3327", }, { name: "GLSA-201903-20", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201903-20", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:cabextract:libmspack:0.4:alpha:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cabextract:libmspack:0.3:alpha:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cabextract:libmspack:0.0.20060920:alpha:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cabextract_project:cabextract:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "1.5", vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cabextract:libmspack:0.5:alpha:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:cabextract:libmspack:0.6:alpha:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2018-14680", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a", refsource: "MISC", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a", }, { name: "https://bugs.debian.org/904801", refsource: "MISC", tags: [ "Issue Tracking", "Mailing List", "Patch", "Third Party Advisory", ], url: "https://bugs.debian.org/904801", }, { name: "http://www.openwall.com/lists/oss-security/2018/07/26/1", refsource: "MISC", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2018/07/26/1", }, { name: "USN-3728-1", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3728-1/", }, { name: "DSA-4260", refsource: "DEBIAN", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2018/dsa-4260", }, { name: "USN-3728-3", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3728-3/", }, { name: "1041410", refsource: "SECTRACK", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041410", }, { name: "[debian-lts-announce] 20180806 [SECURITY] [DLA-1460-1] libmspack security update", refsource: "MLIST", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00007.html", }, { name: "USN-3728-2", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3728-2/", }, { name: "USN-3789-2", refsource: "UBUNTU", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3789-2/", }, { name: "RHSA-2018:3327", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3327", }, { name: "RHSA-2018:3505", refsource: "REDHAT", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3505", }, { name: "GLSA-201903-20", refsource: "GENTOO", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-20", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: true, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, }, }, lastModifiedDate: "2021-04-26T11:45Z", publishedDate: "2018-07-28T23:29Z", }, }, }
ghsa-qfhv-j4j2-7h5x
Vulnerability from github
Published
2022-05-13 01:10
Modified
2022-05-13 01:10
Severity ?
Details
An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.
{ affected: [], aliases: [ "CVE-2018-14680", ], database_specific: { cwe_ids: [ "CWE-20", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2018-07-28T23:29:00Z", severity: "MODERATE", }, details: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.", id: "GHSA-qfhv-j4j2-7h5x", modified: "2022-05-13T01:10:32Z", published: "2022-05-13T01:10:31Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2018-14680", }, { type: "WEB", url: "https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2018:3327", }, { type: "WEB", url: "https://access.redhat.com/errata/RHSA-2018:3505", }, { type: "WEB", url: "https://bugs.debian.org/904801", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00007.html", }, { type: "WEB", url: "https://security.gentoo.org/glsa/201903-20", }, { type: "WEB", url: "https://usn.ubuntu.com/3728-1", }, { type: "WEB", url: "https://usn.ubuntu.com/3728-2", }, { type: "WEB", url: "https://usn.ubuntu.com/3728-3", }, { type: "WEB", url: "https://usn.ubuntu.com/3789-2", }, { type: "WEB", url: "https://www.debian.org/security/2018/dsa-4260", }, { type: "WEB", url: "http://www.openwall.com/lists/oss-security/2018/07/26/1", }, { type: "WEB", url: "http://www.securitytracker.com/id/1041410", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", type: "CVSS_V3", }, ], }
fkie_cve-2018-14680
Vulnerability from fkie_nvd
Published
2018-07-28 23:29
Modified
2024-11-21 03:49
Severity ?
Summary
An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cabextract | libmspack | 0.0.20060920 | |
cabextract | libmspack | 0.3 | |
cabextract | libmspack | 0.4 | |
cabextract | libmspack | 0.5 | |
cabextract | libmspack | 0.6 | |
cabextract_project | cabextract | * | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
redhat | ansible_tower | 3.3 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_workstation | 7.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cabextract:libmspack:0.0.20060920:alpha:*:*:*:*:*:*", matchCriteriaId: "549E0616-8188-411B-9493-8E861AAEDBF9", vulnerable: true, }, { criteria: "cpe:2.3:a:cabextract:libmspack:0.3:alpha:*:*:*:*:*:*", matchCriteriaId: "32C98EEF-4AD0-4A72-85A1-77CF77EE9BE1", vulnerable: true, }, { criteria: "cpe:2.3:a:cabextract:libmspack:0.4:alpha:*:*:*:*:*:*", matchCriteriaId: "AA4A4DCD-E207-467D-9543-C8EDE71E32ED", vulnerable: true, }, { criteria: "cpe:2.3:a:cabextract:libmspack:0.5:alpha:*:*:*:*:*:*", matchCriteriaId: "120C65CB-4E1C-4972-8EA8-C4A6FC09D63A", vulnerable: true, }, { criteria: "cpe:2.3:a:cabextract:libmspack:0.6:alpha:*:*:*:*:*:*", matchCriteriaId: "C7A513DB-0953-4749-9EB9-BB88F0138CF5", vulnerable: true, }, { criteria: "cpe:2.3:a:cabextract_project:cabextract:*:*:*:*:*:*:*:*", matchCriteriaId: "0E0CEBA0-EE24-4721-98CC-0CD2E2350FDC", versionEndIncluding: "1.5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", matchCriteriaId: "8D305F7A-D159-4716-AB26-5E38BB5CD991", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", matchCriteriaId: "B5A6F2F3-4894-4392-8296-3B8DD2679084", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", matchCriteriaId: "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", vulnerable: true, }, { criteria: "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", matchCriteriaId: "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:redhat:ansible_tower:3.3:*:*:*:*:*:*:*", matchCriteriaId: "A5319543-0143-4E2E-AA77-B7F116C1336C", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", matchCriteriaId: "33C068A4-3780-4EAB-A937-6082DF847564", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", matchCriteriaId: "51EF4996-72F4-4FA4-814F-F5991E7A8318", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", matchCriteriaId: "825ECE2D-E232-46E0-A047-074B34DB1E97", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.", }, { lang: "es", value: "Se ha descubierto un problema en mspack/chmd.c en libmspack en versiones anteriores a la 0.7alpha. No rechaza los nombres de archivos CHM en blanco.", }, ], id: "CVE-2018-14680", lastModified: "2024-11-21T03:49:34.480", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-07-28T23:29:00.297", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2018/07/26/1", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041410", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3327", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3505", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", "Mailing List", "Patch", "Third Party Advisory", ], url: "https://bugs.debian.org/904801", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00007.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-20", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3728-1/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3728-2/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3728-3/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3789-2/", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2018/dsa-4260", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2018/07/26/1", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1041410", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3327", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://access.redhat.com/errata/RHSA-2018:3505", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Mailing List", "Patch", "Third Party Advisory", ], url: "https://bugs.debian.org/904801", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2018/08/msg00007.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.gentoo.org/glsa/201903-20", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3728-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3728-2/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3728-3/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://usn.ubuntu.com/3789-2/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.debian.org/security/2018/dsa-4260", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.