Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2019-3842
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
The systemd Project | systemd |
Version: v242-rc4 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T19:19:18.556Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842", }, { name: "FEDORA-2019-3fa5db9e19", tags: [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/", }, { name: "46743", tags: [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred", ], url: "https://www.exploit-db.com/exploits/46743/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html", }, { name: "[debian-lts-announce] 20190424 [SECURITY] [DLA 1762-1] systemd security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html", }, { name: "openSUSE-SU-2019:1450", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "systemd", vendor: "The systemd Project", versions: [ { status: "affected", version: "v242-rc4", }, ], }, ], descriptions: [ { lang: "en", value: "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", }, ], metrics: [ { cvssV3_0: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-285", description: "CWE-285", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-06-29T14:08:37", orgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", shortName: "redhat", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842", }, { name: "FEDORA-2019-3fa5db9e19", tags: [ "vendor-advisory", "x_refsource_FEDORA", ], url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/", }, { name: "46743", tags: [ "exploit", "x_refsource_EXPLOIT-DB", ], url: "https://www.exploit-db.com/exploits/46743/", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html", }, { name: "[debian-lts-announce] 20190424 [SECURITY] [DLA 1762-1] systemd security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html", }, { name: "openSUSE-SU-2019:1450", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2019-3842", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "systemd", version: { version_data: [ { version_value: "v242-rc4", }, ], }, }, ], }, vendor_name: "The systemd Project", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", }, ], }, impact: { cvss: [ [ { vectorString: "4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-285", }, ], }, ], }, references: { reference_data: [ { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842", }, { name: "FEDORA-2019-3fa5db9e19", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/", }, { name: "46743", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/46743/", }, { name: "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html", }, { name: "[debian-lts-announce] 20190424 [SECURITY] [DLA 1762-1] systemd security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html", }, { name: "openSUSE-SU-2019:1450", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "53f830b8-0a3f-465b-8143-3b8a9948e749", assignerShortName: "redhat", cveId: "CVE-2019-3842", datePublished: "2019-04-09T20:25:01", dateReserved: "2019-01-03T00:00:00", dateUpdated: "2024-08-04T19:19:18.556Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2019-3842\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2019-04-09T21:29:03.443\",\"lastModified\":\"2024-11-21T04:42:40.903\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \\\"allow_active\\\" element rather than \\\"allow_any\\\".\"},{\"lang\":\"es\",\"value\":\"En systemd anterior de la versión v242-rc4, fue encontrado que pam_systemd no sanea apropiadamente el entorno anterior usando la variable XDG_SEAT. Es posible que un atacante, en ciertas configuraciones particulares, establezca una variable de entorno XDG_SEAT que permita comprobar los comandos contra las políticas polkit utilizando el elemento \\\"allow_active\\\" en lugar de \\\"allow_any\\\".\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":4.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.0,\"impactScore\":3.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":4.4,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-285\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-863\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"241\",\"matchCriteriaId\":\"02E0A07B-34D3-403B-A503-CB11C9203FE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:systemd_project:systemd:242:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E2ACFB1-6787-47D0-B7F3-CF4F129732A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:systemd_project:systemd:242:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"22EB9C1F-9101-4AD5-80FD-CB5EA224A13F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:systemd_project:systemd:242:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A203307-2242-475A-8ADF-3A1D112655D5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.exploit-db.com/exploits/46743/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.exploit-db.com/exploits/46743/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]}]}}", }, }
opensuse-su-2024:11420-1
Vulnerability from csaf_opensuse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "libsystemd0-249.4-2.2 on GA media", title: "Title of the patch", }, { category: "description", text: "These are all security issues fixed in the libsystemd0-249.4-2.2 package on the GA media of openSUSE Tumbleweed.", title: "Description of the patch", }, { category: "details", text: "openSUSE-Tumbleweed-2024-11420", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11420-1.json", }, { category: "self", summary: "SUSE CVE CVE-2016-10156 page", url: "https://www.suse.com/security/cve/CVE-2016-10156/", }, { category: "self", summary: "SUSE CVE CVE-2017-15908 page", url: "https://www.suse.com/security/cve/CVE-2017-15908/", }, { category: "self", summary: "SUSE CVE CVE-2017-18078 page", url: "https://www.suse.com/security/cve/CVE-2017-18078/", }, { category: "self", summary: "SUSE CVE CVE-2017-9445 page", url: "https://www.suse.com/security/cve/CVE-2017-9445/", }, { category: "self", summary: "SUSE CVE CVE-2018-15686 page", url: "https://www.suse.com/security/cve/CVE-2018-15686/", }, { category: "self", summary: "SUSE CVE CVE-2018-15687 page", url: "https://www.suse.com/security/cve/CVE-2018-15687/", }, { category: "self", summary: "SUSE CVE CVE-2018-15688 page", url: "https://www.suse.com/security/cve/CVE-2018-15688/", }, { category: "self", summary: "SUSE CVE CVE-2018-16864 page", url: "https://www.suse.com/security/cve/CVE-2018-16864/", }, { category: "self", summary: "SUSE CVE CVE-2018-16865 page", url: "https://www.suse.com/security/cve/CVE-2018-16865/", }, { category: "self", summary: "SUSE CVE CVE-2018-21029 page", url: "https://www.suse.com/security/cve/CVE-2018-21029/", }, { category: "self", summary: "SUSE CVE CVE-2018-6954 page", url: "https://www.suse.com/security/cve/CVE-2018-6954/", }, { category: "self", summary: "SUSE CVE CVE-2019-20386 page", url: "https://www.suse.com/security/cve/CVE-2019-20386/", }, { category: "self", summary: "SUSE CVE CVE-2019-3842 page", url: "https://www.suse.com/security/cve/CVE-2019-3842/", }, { category: "self", summary: "SUSE CVE CVE-2019-3843 page", url: "https://www.suse.com/security/cve/CVE-2019-3843/", }, { category: "self", summary: "SUSE CVE CVE-2019-3844 page", url: "https://www.suse.com/security/cve/CVE-2019-3844/", }, { category: "self", summary: "SUSE CVE CVE-2019-6454 page", url: "https://www.suse.com/security/cve/CVE-2019-6454/", }, { category: "self", summary: "SUSE CVE CVE-2020-13529 page", url: "https://www.suse.com/security/cve/CVE-2020-13529/", }, { category: "self", summary: "SUSE CVE CVE-2020-1712 page", url: "https://www.suse.com/security/cve/CVE-2020-1712/", }, { category: "self", summary: "SUSE CVE CVE-2021-33910 page", url: "https://www.suse.com/security/cve/CVE-2021-33910/", }, ], title: "libsystemd0-249.4-2.2 on GA media", tracking: { current_release_date: "2024-06-15T00:00:00Z", generator: { date: "2024-06-15T00:00:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2024:11420-1", initial_release_date: "2024-06-15T00:00:00Z", revision_history: [ { date: "2024-06-15T00:00:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libsystemd0-249.4-2.2.aarch64", product: { name: "libsystemd0-249.4-2.2.aarch64", product_id: "libsystemd0-249.4-2.2.aarch64", }, }, { category: "product_version", name: "libsystemd0-32bit-249.4-2.2.aarch64", product: { name: "libsystemd0-32bit-249.4-2.2.aarch64", product_id: "libsystemd0-32bit-249.4-2.2.aarch64", }, }, { category: "product_version", name: "libudev-devel-249.4-2.2.aarch64", product: { name: "libudev-devel-249.4-2.2.aarch64", product_id: "libudev-devel-249.4-2.2.aarch64", }, }, { category: "product_version", name: "libudev-devel-32bit-249.4-2.2.aarch64", product: { name: "libudev-devel-32bit-249.4-2.2.aarch64", product_id: "libudev-devel-32bit-249.4-2.2.aarch64", }, }, { category: "product_version", name: "libudev1-249.4-2.2.aarch64", product: { name: "libudev1-249.4-2.2.aarch64", product_id: "libudev1-249.4-2.2.aarch64", }, }, { category: "product_version", name: "libudev1-32bit-249.4-2.2.aarch64", product: { name: "libudev1-32bit-249.4-2.2.aarch64", product_id: "libudev1-32bit-249.4-2.2.aarch64", }, }, { category: "product_version", name: "nss-myhostname-249.4-2.2.aarch64", product: { name: "nss-myhostname-249.4-2.2.aarch64", product_id: "nss-myhostname-249.4-2.2.aarch64", }, }, { category: "product_version", name: "nss-myhostname-32bit-249.4-2.2.aarch64", product: { name: "nss-myhostname-32bit-249.4-2.2.aarch64", product_id: "nss-myhostname-32bit-249.4-2.2.aarch64", }, }, { category: "product_version", name: "nss-mymachines-249.4-2.2.aarch64", product: { name: "nss-mymachines-249.4-2.2.aarch64", product_id: "nss-mymachines-249.4-2.2.aarch64", }, }, { category: "product_version", name: "nss-mymachines-32bit-249.4-2.2.aarch64", product: { name: "nss-mymachines-32bit-249.4-2.2.aarch64", product_id: "nss-mymachines-32bit-249.4-2.2.aarch64", }, }, { category: "product_version", name: "nss-resolve-249.4-2.2.aarch64", product: { name: "nss-resolve-249.4-2.2.aarch64", product_id: "nss-resolve-249.4-2.2.aarch64", }, }, { category: "product_version", name: "nss-systemd-249.4-2.2.aarch64", product: { name: "nss-systemd-249.4-2.2.aarch64", product_id: "nss-systemd-249.4-2.2.aarch64", }, }, { category: "product_version", name: "systemd-249.4-2.2.aarch64", product: { name: "systemd-249.4-2.2.aarch64", product_id: "systemd-249.4-2.2.aarch64", }, }, { category: "product_version", name: "systemd-32bit-249.4-2.2.aarch64", product: { name: "systemd-32bit-249.4-2.2.aarch64", product_id: "systemd-32bit-249.4-2.2.aarch64", }, }, { category: "product_version", name: "systemd-container-249.4-2.2.aarch64", product: { name: "systemd-container-249.4-2.2.aarch64", product_id: "systemd-container-249.4-2.2.aarch64", }, }, { category: "product_version", name: "systemd-coredump-249.4-2.2.aarch64", product: { name: "systemd-coredump-249.4-2.2.aarch64", product_id: "systemd-coredump-249.4-2.2.aarch64", }, }, { category: "product_version", name: "systemd-devel-249.4-2.2.aarch64", product: { name: "systemd-devel-249.4-2.2.aarch64", product_id: "systemd-devel-249.4-2.2.aarch64", }, }, { category: "product_version", name: "systemd-doc-249.4-2.2.aarch64", product: { name: "systemd-doc-249.4-2.2.aarch64", product_id: "systemd-doc-249.4-2.2.aarch64", }, }, { category: "product_version", name: "systemd-experimental-249.4-2.2.aarch64", product: { name: "systemd-experimental-249.4-2.2.aarch64", product_id: "systemd-experimental-249.4-2.2.aarch64", }, }, { category: "product_version", name: "systemd-journal-remote-249.4-2.2.aarch64", product: { name: "systemd-journal-remote-249.4-2.2.aarch64", product_id: "systemd-journal-remote-249.4-2.2.aarch64", }, }, { category: "product_version", name: "systemd-lang-249.4-2.2.aarch64", product: { name: "systemd-lang-249.4-2.2.aarch64", product_id: "systemd-lang-249.4-2.2.aarch64", }, }, { category: "product_version", name: "systemd-logger-249.4-2.2.aarch64", product: { name: "systemd-logger-249.4-2.2.aarch64", product_id: "systemd-logger-249.4-2.2.aarch64", }, }, { category: "product_version", name: "systemd-network-249.4-2.2.aarch64", product: { name: "systemd-network-249.4-2.2.aarch64", product_id: "systemd-network-249.4-2.2.aarch64", }, }, { category: "product_version", name: "systemd-portable-249.4-2.2.aarch64", product: { name: "systemd-portable-249.4-2.2.aarch64", product_id: "systemd-portable-249.4-2.2.aarch64", }, }, { category: "product_version", name: "systemd-sysvinit-249.4-2.2.aarch64", product: { name: "systemd-sysvinit-249.4-2.2.aarch64", product_id: "systemd-sysvinit-249.4-2.2.aarch64", }, }, { category: "product_version", name: "systemd-testsuite-249.4-2.2.aarch64", product: { name: "systemd-testsuite-249.4-2.2.aarch64", product_id: "systemd-testsuite-249.4-2.2.aarch64", }, }, { category: "product_version", name: "udev-249.4-2.2.aarch64", product: { name: "udev-249.4-2.2.aarch64", product_id: "udev-249.4-2.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libsystemd0-249.4-2.2.ppc64le", product: { name: "libsystemd0-249.4-2.2.ppc64le", product_id: "libsystemd0-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "libsystemd0-32bit-249.4-2.2.ppc64le", product: { name: "libsystemd0-32bit-249.4-2.2.ppc64le", product_id: "libsystemd0-32bit-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "libudev-devel-249.4-2.2.ppc64le", product: { name: "libudev-devel-249.4-2.2.ppc64le", product_id: "libudev-devel-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "libudev-devel-32bit-249.4-2.2.ppc64le", product: { name: "libudev-devel-32bit-249.4-2.2.ppc64le", product_id: "libudev-devel-32bit-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "libudev1-249.4-2.2.ppc64le", product: { name: "libudev1-249.4-2.2.ppc64le", product_id: "libudev1-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "libudev1-32bit-249.4-2.2.ppc64le", product: { name: "libudev1-32bit-249.4-2.2.ppc64le", product_id: "libudev1-32bit-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "nss-myhostname-249.4-2.2.ppc64le", product: { name: "nss-myhostname-249.4-2.2.ppc64le", product_id: "nss-myhostname-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "nss-myhostname-32bit-249.4-2.2.ppc64le", product: { name: "nss-myhostname-32bit-249.4-2.2.ppc64le", product_id: "nss-myhostname-32bit-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "nss-mymachines-249.4-2.2.ppc64le", product: { name: "nss-mymachines-249.4-2.2.ppc64le", product_id: "nss-mymachines-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "nss-mymachines-32bit-249.4-2.2.ppc64le", product: { name: "nss-mymachines-32bit-249.4-2.2.ppc64le", product_id: "nss-mymachines-32bit-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "nss-resolve-249.4-2.2.ppc64le", product: { name: "nss-resolve-249.4-2.2.ppc64le", product_id: "nss-resolve-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "nss-systemd-249.4-2.2.ppc64le", product: { name: "nss-systemd-249.4-2.2.ppc64le", product_id: "nss-systemd-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "systemd-249.4-2.2.ppc64le", product: { name: "systemd-249.4-2.2.ppc64le", product_id: "systemd-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "systemd-32bit-249.4-2.2.ppc64le", product: { name: "systemd-32bit-249.4-2.2.ppc64le", product_id: "systemd-32bit-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "systemd-container-249.4-2.2.ppc64le", product: { name: "systemd-container-249.4-2.2.ppc64le", product_id: "systemd-container-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "systemd-coredump-249.4-2.2.ppc64le", product: { name: "systemd-coredump-249.4-2.2.ppc64le", product_id: "systemd-coredump-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "systemd-devel-249.4-2.2.ppc64le", product: { name: "systemd-devel-249.4-2.2.ppc64le", product_id: "systemd-devel-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "systemd-doc-249.4-2.2.ppc64le", product: { name: "systemd-doc-249.4-2.2.ppc64le", product_id: "systemd-doc-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "systemd-experimental-249.4-2.2.ppc64le", product: { name: "systemd-experimental-249.4-2.2.ppc64le", product_id: "systemd-experimental-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "systemd-journal-remote-249.4-2.2.ppc64le", product: { name: "systemd-journal-remote-249.4-2.2.ppc64le", product_id: "systemd-journal-remote-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "systemd-lang-249.4-2.2.ppc64le", product: { name: "systemd-lang-249.4-2.2.ppc64le", product_id: "systemd-lang-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "systemd-logger-249.4-2.2.ppc64le", product: { name: "systemd-logger-249.4-2.2.ppc64le", product_id: "systemd-logger-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "systemd-network-249.4-2.2.ppc64le", product: { name: "systemd-network-249.4-2.2.ppc64le", product_id: "systemd-network-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "systemd-portable-249.4-2.2.ppc64le", product: { name: "systemd-portable-249.4-2.2.ppc64le", product_id: "systemd-portable-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "systemd-sysvinit-249.4-2.2.ppc64le", product: { name: "systemd-sysvinit-249.4-2.2.ppc64le", product_id: "systemd-sysvinit-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "systemd-testsuite-249.4-2.2.ppc64le", product: { name: "systemd-testsuite-249.4-2.2.ppc64le", product_id: "systemd-testsuite-249.4-2.2.ppc64le", }, }, { category: "product_version", name: "udev-249.4-2.2.ppc64le", product: { name: "udev-249.4-2.2.ppc64le", product_id: "udev-249.4-2.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libsystemd0-249.4-2.2.s390x", product: { name: "libsystemd0-249.4-2.2.s390x", product_id: "libsystemd0-249.4-2.2.s390x", }, }, { category: "product_version", name: "libsystemd0-32bit-249.4-2.2.s390x", product: { name: "libsystemd0-32bit-249.4-2.2.s390x", product_id: "libsystemd0-32bit-249.4-2.2.s390x", }, }, { category: "product_version", name: "libudev-devel-249.4-2.2.s390x", product: { name: "libudev-devel-249.4-2.2.s390x", product_id: "libudev-devel-249.4-2.2.s390x", }, }, { category: "product_version", name: "libudev-devel-32bit-249.4-2.2.s390x", product: { name: "libudev-devel-32bit-249.4-2.2.s390x", product_id: "libudev-devel-32bit-249.4-2.2.s390x", }, }, { category: "product_version", name: "libudev1-249.4-2.2.s390x", product: { name: "libudev1-249.4-2.2.s390x", product_id: "libudev1-249.4-2.2.s390x", }, }, { category: "product_version", name: "libudev1-32bit-249.4-2.2.s390x", product: { name: "libudev1-32bit-249.4-2.2.s390x", product_id: "libudev1-32bit-249.4-2.2.s390x", }, }, { category: "product_version", name: "nss-myhostname-249.4-2.2.s390x", product: { name: "nss-myhostname-249.4-2.2.s390x", product_id: "nss-myhostname-249.4-2.2.s390x", }, }, { category: "product_version", name: "nss-myhostname-32bit-249.4-2.2.s390x", product: { name: "nss-myhostname-32bit-249.4-2.2.s390x", product_id: "nss-myhostname-32bit-249.4-2.2.s390x", }, }, { category: "product_version", name: "nss-mymachines-249.4-2.2.s390x", product: { name: "nss-mymachines-249.4-2.2.s390x", product_id: "nss-mymachines-249.4-2.2.s390x", }, }, { category: "product_version", name: "nss-mymachines-32bit-249.4-2.2.s390x", product: { name: "nss-mymachines-32bit-249.4-2.2.s390x", product_id: "nss-mymachines-32bit-249.4-2.2.s390x", }, }, { category: "product_version", name: "nss-resolve-249.4-2.2.s390x", product: { name: "nss-resolve-249.4-2.2.s390x", product_id: "nss-resolve-249.4-2.2.s390x", }, }, { category: "product_version", name: "nss-systemd-249.4-2.2.s390x", product: { name: "nss-systemd-249.4-2.2.s390x", product_id: "nss-systemd-249.4-2.2.s390x", }, }, { category: "product_version", name: "systemd-249.4-2.2.s390x", product: { name: "systemd-249.4-2.2.s390x", product_id: "systemd-249.4-2.2.s390x", }, }, { category: "product_version", name: "systemd-32bit-249.4-2.2.s390x", product: { name: "systemd-32bit-249.4-2.2.s390x", product_id: "systemd-32bit-249.4-2.2.s390x", }, }, { category: "product_version", name: "systemd-container-249.4-2.2.s390x", product: { name: "systemd-container-249.4-2.2.s390x", product_id: "systemd-container-249.4-2.2.s390x", }, }, { category: "product_version", name: "systemd-coredump-249.4-2.2.s390x", product: { name: "systemd-coredump-249.4-2.2.s390x", product_id: "systemd-coredump-249.4-2.2.s390x", }, }, { category: "product_version", name: "systemd-devel-249.4-2.2.s390x", product: { name: "systemd-devel-249.4-2.2.s390x", product_id: "systemd-devel-249.4-2.2.s390x", }, }, { category: "product_version", name: "systemd-doc-249.4-2.2.s390x", product: { name: "systemd-doc-249.4-2.2.s390x", product_id: "systemd-doc-249.4-2.2.s390x", }, }, { category: "product_version", name: "systemd-experimental-249.4-2.2.s390x", product: { name: "systemd-experimental-249.4-2.2.s390x", product_id: "systemd-experimental-249.4-2.2.s390x", }, }, { category: "product_version", name: "systemd-journal-remote-249.4-2.2.s390x", product: { name: "systemd-journal-remote-249.4-2.2.s390x", product_id: "systemd-journal-remote-249.4-2.2.s390x", }, }, { category: "product_version", name: "systemd-lang-249.4-2.2.s390x", product: { name: "systemd-lang-249.4-2.2.s390x", product_id: "systemd-lang-249.4-2.2.s390x", }, }, { category: "product_version", name: "systemd-logger-249.4-2.2.s390x", product: { name: "systemd-logger-249.4-2.2.s390x", product_id: "systemd-logger-249.4-2.2.s390x", }, }, { category: "product_version", name: "systemd-network-249.4-2.2.s390x", product: { name: "systemd-network-249.4-2.2.s390x", product_id: "systemd-network-249.4-2.2.s390x", }, }, { category: "product_version", name: "systemd-portable-249.4-2.2.s390x", product: { name: "systemd-portable-249.4-2.2.s390x", product_id: "systemd-portable-249.4-2.2.s390x", }, }, { category: "product_version", name: "systemd-sysvinit-249.4-2.2.s390x", product: { name: "systemd-sysvinit-249.4-2.2.s390x", product_id: "systemd-sysvinit-249.4-2.2.s390x", }, }, { category: "product_version", name: "systemd-testsuite-249.4-2.2.s390x", product: { name: "systemd-testsuite-249.4-2.2.s390x", product_id: "systemd-testsuite-249.4-2.2.s390x", }, }, { category: "product_version", name: "udev-249.4-2.2.s390x", product: { name: "udev-249.4-2.2.s390x", product_id: "udev-249.4-2.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libsystemd0-249.4-2.2.x86_64", product: { name: "libsystemd0-249.4-2.2.x86_64", product_id: "libsystemd0-249.4-2.2.x86_64", }, }, { category: "product_version", name: "libsystemd0-32bit-249.4-2.2.x86_64", product: { name: "libsystemd0-32bit-249.4-2.2.x86_64", product_id: "libsystemd0-32bit-249.4-2.2.x86_64", }, }, { category: "product_version", name: "libudev-devel-249.4-2.2.x86_64", product: { name: "libudev-devel-249.4-2.2.x86_64", product_id: "libudev-devel-249.4-2.2.x86_64", }, }, { category: "product_version", name: "libudev-devel-32bit-249.4-2.2.x86_64", product: { name: "libudev-devel-32bit-249.4-2.2.x86_64", product_id: "libudev-devel-32bit-249.4-2.2.x86_64", }, }, { category: "product_version", name: "libudev1-249.4-2.2.x86_64", product: { name: "libudev1-249.4-2.2.x86_64", product_id: "libudev1-249.4-2.2.x86_64", }, }, { category: "product_version", name: "libudev1-32bit-249.4-2.2.x86_64", product: { name: "libudev1-32bit-249.4-2.2.x86_64", product_id: "libudev1-32bit-249.4-2.2.x86_64", }, }, { category: "product_version", name: "nss-myhostname-249.4-2.2.x86_64", product: { name: "nss-myhostname-249.4-2.2.x86_64", product_id: "nss-myhostname-249.4-2.2.x86_64", }, }, { category: "product_version", name: "nss-myhostname-32bit-249.4-2.2.x86_64", product: { name: "nss-myhostname-32bit-249.4-2.2.x86_64", product_id: "nss-myhostname-32bit-249.4-2.2.x86_64", }, }, { category: "product_version", name: "nss-mymachines-249.4-2.2.x86_64", product: { name: "nss-mymachines-249.4-2.2.x86_64", product_id: "nss-mymachines-249.4-2.2.x86_64", }, }, { category: "product_version", name: "nss-mymachines-32bit-249.4-2.2.x86_64", product: { name: "nss-mymachines-32bit-249.4-2.2.x86_64", product_id: "nss-mymachines-32bit-249.4-2.2.x86_64", }, }, { category: "product_version", name: "nss-resolve-249.4-2.2.x86_64", product: { name: "nss-resolve-249.4-2.2.x86_64", product_id: "nss-resolve-249.4-2.2.x86_64", }, }, { category: "product_version", name: "nss-systemd-249.4-2.2.x86_64", product: { name: "nss-systemd-249.4-2.2.x86_64", product_id: "nss-systemd-249.4-2.2.x86_64", }, }, { category: "product_version", name: "systemd-249.4-2.2.x86_64", product: { name: "systemd-249.4-2.2.x86_64", product_id: "systemd-249.4-2.2.x86_64", }, }, { category: "product_version", name: "systemd-32bit-249.4-2.2.x86_64", product: { name: "systemd-32bit-249.4-2.2.x86_64", product_id: "systemd-32bit-249.4-2.2.x86_64", }, }, { category: "product_version", name: "systemd-container-249.4-2.2.x86_64", product: { name: "systemd-container-249.4-2.2.x86_64", product_id: "systemd-container-249.4-2.2.x86_64", }, }, { category: "product_version", name: "systemd-coredump-249.4-2.2.x86_64", product: { name: "systemd-coredump-249.4-2.2.x86_64", product_id: "systemd-coredump-249.4-2.2.x86_64", }, }, { category: "product_version", name: "systemd-devel-249.4-2.2.x86_64", product: { name: "systemd-devel-249.4-2.2.x86_64", product_id: "systemd-devel-249.4-2.2.x86_64", }, }, { category: "product_version", name: "systemd-doc-249.4-2.2.x86_64", product: { name: "systemd-doc-249.4-2.2.x86_64", product_id: "systemd-doc-249.4-2.2.x86_64", }, }, { category: "product_version", name: "systemd-experimental-249.4-2.2.x86_64", product: { name: "systemd-experimental-249.4-2.2.x86_64", product_id: "systemd-experimental-249.4-2.2.x86_64", }, }, { category: "product_version", name: "systemd-journal-remote-249.4-2.2.x86_64", product: { name: "systemd-journal-remote-249.4-2.2.x86_64", product_id: "systemd-journal-remote-249.4-2.2.x86_64", }, }, { category: "product_version", name: "systemd-lang-249.4-2.2.x86_64", product: { name: "systemd-lang-249.4-2.2.x86_64", product_id: "systemd-lang-249.4-2.2.x86_64", }, }, { category: "product_version", name: "systemd-logger-249.4-2.2.x86_64", product: { name: "systemd-logger-249.4-2.2.x86_64", product_id: "systemd-logger-249.4-2.2.x86_64", }, }, { category: "product_version", name: "systemd-network-249.4-2.2.x86_64", product: { name: "systemd-network-249.4-2.2.x86_64", product_id: "systemd-network-249.4-2.2.x86_64", }, }, { category: "product_version", name: "systemd-portable-249.4-2.2.x86_64", product: { name: "systemd-portable-249.4-2.2.x86_64", product_id: "systemd-portable-249.4-2.2.x86_64", }, }, { category: "product_version", name: "systemd-sysvinit-249.4-2.2.x86_64", product: { name: "systemd-sysvinit-249.4-2.2.x86_64", product_id: "systemd-sysvinit-249.4-2.2.x86_64", }, }, { category: "product_version", name: "systemd-testsuite-249.4-2.2.x86_64", product: { name: "systemd-testsuite-249.4-2.2.x86_64", product_id: "systemd-testsuite-249.4-2.2.x86_64", }, }, { category: "product_version", name: "udev-249.4-2.2.x86_64", product: { name: "udev-249.4-2.2.x86_64", product_id: "udev-249.4-2.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Tumbleweed", product: { name: "openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed", product_identification_helper: { cpe: "cpe:/o:opensuse:tumbleweed", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libsystemd0-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", }, product_reference: "libsystemd0-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", }, product_reference: "libsystemd0-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", }, product_reference: "libsystemd0-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", }, product_reference: "libsystemd0-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", }, product_reference: "libsystemd0-32bit-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", }, product_reference: "libsystemd0-32bit-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", }, product_reference: "libsystemd0-32bit-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", }, product_reference: "libsystemd0-32bit-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", }, product_reference: "libudev-devel-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", }, product_reference: "libudev-devel-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", }, product_reference: "libudev-devel-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", }, product_reference: "libudev-devel-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-32bit-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", }, product_reference: "libudev-devel-32bit-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-32bit-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", }, product_reference: "libudev-devel-32bit-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-32bit-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", }, product_reference: "libudev-devel-32bit-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-32bit-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", }, product_reference: "libudev-devel-32bit-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libudev1-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", }, product_reference: "libudev1-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libudev1-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", }, product_reference: "libudev1-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libudev1-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", }, product_reference: "libudev1-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libudev1-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", }, product_reference: "libudev1-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", }, product_reference: "libudev1-32bit-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", }, product_reference: "libudev1-32bit-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", }, product_reference: "libudev1-32bit-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", }, product_reference: "libudev1-32bit-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-myhostname-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", }, product_reference: "nss-myhostname-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-myhostname-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", }, product_reference: "nss-myhostname-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-myhostname-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", }, product_reference: "nss-myhostname-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-myhostname-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", }, product_reference: "nss-myhostname-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-myhostname-32bit-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", }, product_reference: "nss-myhostname-32bit-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-myhostname-32bit-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", }, product_reference: "nss-myhostname-32bit-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-myhostname-32bit-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", }, product_reference: "nss-myhostname-32bit-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-myhostname-32bit-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", }, product_reference: "nss-myhostname-32bit-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-mymachines-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", }, product_reference: "nss-mymachines-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-mymachines-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", }, product_reference: "nss-mymachines-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-mymachines-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", }, product_reference: "nss-mymachines-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-mymachines-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", }, product_reference: "nss-mymachines-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-mymachines-32bit-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", }, product_reference: "nss-mymachines-32bit-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-mymachines-32bit-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", }, product_reference: "nss-mymachines-32bit-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-mymachines-32bit-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", }, product_reference: "nss-mymachines-32bit-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-mymachines-32bit-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", }, product_reference: "nss-mymachines-32bit-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-resolve-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", }, product_reference: "nss-resolve-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-resolve-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", }, product_reference: "nss-resolve-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-resolve-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", }, product_reference: "nss-resolve-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-resolve-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", }, product_reference: "nss-resolve-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-systemd-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", }, product_reference: "nss-systemd-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-systemd-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", }, product_reference: "nss-systemd-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-systemd-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", }, product_reference: "nss-systemd-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "nss-systemd-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", }, product_reference: "nss-systemd-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", }, product_reference: "systemd-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", }, product_reference: "systemd-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", }, product_reference: "systemd-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", }, product_reference: "systemd-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", }, product_reference: "systemd-32bit-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", }, product_reference: "systemd-32bit-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", }, product_reference: "systemd-32bit-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", }, product_reference: "systemd-32bit-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-container-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", }, product_reference: "systemd-container-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-container-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", }, product_reference: "systemd-container-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-container-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", }, product_reference: "systemd-container-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-container-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", }, product_reference: "systemd-container-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-coredump-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", }, product_reference: "systemd-coredump-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-coredump-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", }, product_reference: "systemd-coredump-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-coredump-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", }, product_reference: "systemd-coredump-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-coredump-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", }, product_reference: "systemd-coredump-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", }, product_reference: "systemd-devel-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", }, product_reference: "systemd-devel-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", }, product_reference: "systemd-devel-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", }, product_reference: "systemd-devel-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-doc-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", }, product_reference: "systemd-doc-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-doc-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", }, product_reference: "systemd-doc-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-doc-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", }, product_reference: "systemd-doc-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-doc-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", }, product_reference: "systemd-doc-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-experimental-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", }, product_reference: "systemd-experimental-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-experimental-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", }, product_reference: "systemd-experimental-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-experimental-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", }, product_reference: "systemd-experimental-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-experimental-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", }, product_reference: "systemd-experimental-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", }, product_reference: "systemd-journal-remote-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", }, product_reference: "systemd-journal-remote-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", }, product_reference: "systemd-journal-remote-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", }, product_reference: "systemd-journal-remote-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-lang-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", }, product_reference: "systemd-lang-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-lang-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", }, product_reference: "systemd-lang-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-lang-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", }, product_reference: "systemd-lang-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-lang-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", }, product_reference: "systemd-lang-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-logger-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", }, product_reference: "systemd-logger-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-logger-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", }, product_reference: "systemd-logger-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-logger-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", }, product_reference: "systemd-logger-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-logger-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", }, product_reference: "systemd-logger-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-network-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", }, product_reference: "systemd-network-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-network-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", }, product_reference: "systemd-network-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-network-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", }, product_reference: "systemd-network-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-network-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", }, product_reference: "systemd-network-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-portable-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", }, product_reference: "systemd-portable-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-portable-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", }, product_reference: "systemd-portable-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-portable-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", }, product_reference: "systemd-portable-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-portable-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", }, product_reference: "systemd-portable-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", }, product_reference: "systemd-sysvinit-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", }, product_reference: "systemd-sysvinit-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", }, product_reference: "systemd-sysvinit-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", }, product_reference: "systemd-sysvinit-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-testsuite-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", }, product_reference: "systemd-testsuite-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-testsuite-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", }, product_reference: "systemd-testsuite-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-testsuite-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", }, product_reference: "systemd-testsuite-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "systemd-testsuite-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", }, product_reference: "systemd-testsuite-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "udev-249.4-2.2.aarch64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", }, product_reference: "udev-249.4-2.2.aarch64", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "udev-249.4-2.2.ppc64le as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", }, product_reference: "udev-249.4-2.2.ppc64le", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "udev-249.4-2.2.s390x as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:udev-249.4-2.2.s390x", }, product_reference: "udev-249.4-2.2.s390x", relates_to_product_reference: "openSUSE Tumbleweed", }, { category: "default_component_of", full_product_name: { name: "udev-249.4-2.2.x86_64 as component of openSUSE Tumbleweed", product_id: "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", }, product_reference: "udev-249.4-2.2.x86_64", relates_to_product_reference: "openSUSE Tumbleweed", }, ], }, vulnerabilities: [ { cve: "CVE-2016-10156", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2016-10156", }, ], notes: [ { category: "general", text: "A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2016-10156", url: "https://www.suse.com/security/cve/CVE-2016-10156", }, { category: "external", summary: "SUSE Bug 1020601 for CVE-2016-10156", url: "https://bugzilla.suse.com/1020601", }, { category: "external", summary: "SUSE Bug 1021969 for CVE-2016-10156", url: "https://bugzilla.suse.com/1021969", }, { category: "external", summary: "SUSE Bug 1086936 for CVE-2016-10156", url: "https://bugzilla.suse.com/1086936", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2016-10156", }, { cve: "CVE-2017-15908", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-15908", }, ], notes: [ { category: "general", text: "In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the 'systemd-resolved' service and cause a DoS of the affected service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-15908", url: "https://www.suse.com/security/cve/CVE-2017-15908", }, { category: "external", summary: "SUSE Bug 1065276 for CVE-2017-15908", url: "https://bugzilla.suse.com/1065276", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2017-15908", }, { cve: "CVE-2017-18078", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-18078", }, ], notes: [ { category: "general", text: "systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the ownership of the /etc/passwd file.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-18078", url: "https://www.suse.com/security/cve/CVE-2017-18078", }, { category: "external", summary: "SUSE Bug 1077925 for CVE-2017-18078", url: "https://bugzilla.suse.com/1077925", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-18078", }, { cve: "CVE-2017-9445", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9445", }, ], notes: [ { category: "general", text: "In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that's too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9445", url: "https://www.suse.com/security/cve/CVE-2017-9445", }, { category: "external", summary: "SUSE Bug 1045290 for CVE-2017-9445", url: "https://bugzilla.suse.com/1045290", }, { category: "external", summary: "SUSE Bug 1063249 for CVE-2017-9445", url: "https://bugzilla.suse.com/1063249", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2017-9445", }, { cve: "CVE-2018-15686", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-15686", }, ], notes: [ { category: "general", text: "A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-15686", url: "https://www.suse.com/security/cve/CVE-2018-15686", }, { category: "external", summary: "SUSE Bug 1113665 for CVE-2018-15686", url: "https://bugzilla.suse.com/1113665", }, { category: "external", summary: "SUSE Bug 1120323 for CVE-2018-15686", url: "https://bugzilla.suse.com/1120323", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.6, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-15686", }, { cve: "CVE-2018-15687", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-15687", }, ], notes: [ { category: "general", text: "A race condition in chown_one() of systemd allows an attacker to cause systemd to set arbitrary permissions on arbitrary files. Affected releases are systemd versions up to and including 239.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-15687", url: "https://www.suse.com/security/cve/CVE-2018-15687", }, { category: "external", summary: "SUSE Bug 1113666 for CVE-2018-15687", url: "https://bugzilla.suse.com/1113666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2018-15687", }, { cve: "CVE-2018-15688", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-15688", }, ], notes: [ { category: "general", text: "A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-15688", url: "https://www.suse.com/security/cve/CVE-2018-15688", }, { category: "external", summary: "SUSE Bug 1113632 for CVE-2018-15688", url: "https://bugzilla.suse.com/1113632", }, { category: "external", summary: "SUSE Bug 1113668 for CVE-2018-15688", url: "https://bugzilla.suse.com/1113668", }, { category: "external", summary: "SUSE Bug 1113669 for CVE-2018-15688", url: "https://bugzilla.suse.com/1113669", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-15688", }, { cve: "CVE-2018-16864", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16864", }, ], notes: [ { category: "general", text: "An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16864", url: "https://www.suse.com/security/cve/CVE-2018-16864", }, { category: "external", summary: "SUSE Bug 1108912 for CVE-2018-16864", url: "https://bugzilla.suse.com/1108912", }, { category: "external", summary: "SUSE Bug 1120323 for CVE-2018-16864", url: "https://bugzilla.suse.com/1120323", }, { category: "external", summary: "SUSE Bug 1122265 for CVE-2018-16864", url: "https://bugzilla.suse.com/1122265", }, { category: "external", summary: "SUSE Bug 1188063 for CVE-2018-16864", url: "https://bugzilla.suse.com/1188063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-16864", }, { cve: "CVE-2018-16865", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-16865", }, ], notes: [ { category: "general", text: "An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-16865", url: "https://www.suse.com/security/cve/CVE-2018-16865", }, { category: "external", summary: "SUSE Bug 1108912 for CVE-2018-16865", url: "https://bugzilla.suse.com/1108912", }, { category: "external", summary: "SUSE Bug 1120323 for CVE-2018-16865", url: "https://bugzilla.suse.com/1120323", }, { category: "external", summary: "SUSE Bug 1122265 for CVE-2018-16865", url: "https://bugzilla.suse.com/1122265", }, { category: "external", summary: "SUSE Bug 1188063 for CVE-2018-16865", url: "https://bugzilla.suse.com/1188063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-16865", }, { cve: "CVE-2018-21029", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-21029", }, ], notes: [ { category: "general", text: "** DISPUTED ** systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-21029", url: "https://www.suse.com/security/cve/CVE-2018-21029", }, { category: "external", summary: "SUSE Bug 1155539 for CVE-2018-21029", url: "https://bugzilla.suse.com/1155539", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "critical", }, ], title: "CVE-2018-21029", }, { cve: "CVE-2018-6954", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6954", }, ], notes: [ { category: "general", text: "systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files via vectors involving creation of a directory and a file under that directory, and later replacing that directory with a symlink. This occurs even if the fs.protected_symlinks sysctl is turned on.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6954", url: "https://www.suse.com/security/cve/CVE-2018-6954", }, { category: "external", summary: "SUSE Bug 1080919 for CVE-2018-6954", url: "https://bugzilla.suse.com/1080919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2018-6954", }, { cve: "CVE-2019-20386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20386", }, ], notes: [ { category: "general", text: "An issue was discovered in button_open in login/logind-button.c in systemd before 243. When executing the udevadm trigger command, a memory leak may occur.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20386", url: "https://www.suse.com/security/cve/CVE-2019-20386", }, { category: "external", summary: "SUSE Bug 1161436 for CVE-2019-20386", url: "https://bugzilla.suse.com/1161436", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.4, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "low", }, ], title: "CVE-2019-20386", }, { cve: "CVE-2019-3842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3842", }, ], notes: [ { category: "general", text: "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3842", url: "https://www.suse.com/security/cve/CVE-2019-3842", }, { category: "external", summary: "SUSE Bug 1132348 for CVE-2019-3842", url: "https://bugzilla.suse.com/1132348", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-3842", }, { cve: "CVE-2019-3843", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3843", }, ], notes: [ { category: "general", text: "It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3843", url: "https://www.suse.com/security/cve/CVE-2019-3843", }, { category: "external", summary: "SUSE Bug 1133506 for CVE-2019-3843", url: "https://bugzilla.suse.com/1133506", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-3843", }, { cve: "CVE-2019-3844", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3844", }, ], notes: [ { category: "general", text: "It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3844", url: "https://www.suse.com/security/cve/CVE-2019-3844", }, { category: "external", summary: "SUSE Bug 1133509 for CVE-2019-3844", url: "https://bugzilla.suse.com/1133509", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2019-3844", }, { cve: "CVE-2019-6454", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-6454", }, ], notes: [ { category: "general", text: "An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-6454", url: "https://www.suse.com/security/cve/CVE-2019-6454", }, { category: "external", summary: "SUSE Bug 1125352 for CVE-2019-6454", url: "https://bugzilla.suse.com/1125352", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2019-6454", }, { cve: "CVE-2020-13529", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-13529", }, ], notes: [ { category: "general", text: "An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-13529", url: "https://www.suse.com/security/cve/CVE-2020-13529", }, { category: "external", summary: "SUSE Bug 1185972 for CVE-2020-13529", url: "https://bugzilla.suse.com/1185972", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2020-13529", }, { cve: "CVE-2020-1712", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-1712", }, ], notes: [ { category: "general", text: "A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-1712", url: "https://www.suse.com/security/cve/CVE-2020-1712", }, { category: "external", summary: "SUSE Bug 1162108 for CVE-2020-1712", url: "https://bugzilla.suse.com/1162108", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "important", }, ], title: "CVE-2020-1712", }, { cve: "CVE-2021-33910", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-33910", }, ], notes: [ { category: "general", text: "basic/unit-name.c in systemd prior to 246.15, 247.8, 248.5, and 249.1 has a Memory Allocation with an Excessive Size Value (involving strdupa and alloca for a pathname controlled by a local attacker) that results in an operating system crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-33910", url: "https://www.suse.com/security/cve/CVE-2021-33910", }, { category: "external", summary: "SUSE Bug 1188062 for CVE-2021-33910", url: "https://bugzilla.suse.com/1188062", }, { category: "external", summary: "SUSE Bug 1188063 for CVE-2021-33910", url: "https://bugzilla.suse.com/1188063", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x", "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64", "openSUSE Tumbleweed:udev-249.4-2.2.aarch64", "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le", "openSUSE Tumbleweed:udev-249.4-2.2.s390x", "openSUSE Tumbleweed:udev-249.4-2.2.x86_64", ], }, ], threats: [ { category: "impact", date: "2024-06-15T00:00:00Z", details: "moderate", }, ], title: "CVE-2021-33910", }, ], }
rhsa-2021:3900
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for systemd is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.\n\nSecurity Fix(es):\n\n* systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\" (CVE-2019-3842)\n\n* systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits (CVE-2020-13776)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:3900", url: "https://access.redhat.com/errata/RHSA-2021:3900", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1668521", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1668521", }, { category: "external", summary: "1845534", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1845534", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3900.json", }, ], title: "Red Hat Security Advisory: systemd security update", tracking: { current_release_date: "2024-11-22T15:56:28+00:00", generator: { date: "2024-11-22T15:56:28+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:3900", initial_release_date: "2021-10-19T07:18:34+00:00", revision_history: [ { date: "2021-10-19T07:18:34+00:00", number: "1", summary: "Initial version", }, { date: "2021-10-19T07:18:34+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T15:56:28+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product: { name: "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:8.2::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "systemd-0:239-31.el8_2.7.src", product: { name: "systemd-0:239-31.el8_2.7.src", product_id: "systemd-0:239-31.el8_2.7.src", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "systemd-0:239-31.el8_2.7.aarch64", product: { name: "systemd-0:239-31.el8_2.7.aarch64", product_id: "systemd-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-container-0:239-31.el8_2.7.aarch64", product: { name: "systemd-container-0:239-31.el8_2.7.aarch64", product_id: "systemd-container-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-devel-0:239-31.el8_2.7.aarch64", product: { name: "systemd-devel-0:239-31.el8_2.7.aarch64", product_id: "systemd-devel-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-31.el8_2.7.aarch64", product: { name: "systemd-journal-remote-0:239-31.el8_2.7.aarch64", product_id: "systemd-journal-remote-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-libs-0:239-31.el8_2.7.aarch64", product: { name: "systemd-libs-0:239-31.el8_2.7.aarch64", product_id: "systemd-libs-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-pam-0:239-31.el8_2.7.aarch64", product: { name: "systemd-pam-0:239-31.el8_2.7.aarch64", product_id: "systemd-pam-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-tests-0:239-31.el8_2.7.aarch64", product: { name: "systemd-tests-0:239-31.el8_2.7.aarch64", product_id: "systemd-tests-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-udev-0:239-31.el8_2.7.aarch64", product: { name: "systemd-udev-0:239-31.el8_2.7.aarch64", product_id: "systemd-udev-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-31.el8_2.7.aarch64", product: { name: "systemd-debugsource-0:239-31.el8_2.7.aarch64", product_id: "systemd-debugsource-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "systemd-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-0:239-31.el8_2.7.ppc64le", product_id: "systemd-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-container-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-container-0:239-31.el8_2.7.ppc64le", product_id: "systemd-container-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-devel-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-devel-0:239-31.el8_2.7.ppc64le", product_id: "systemd-devel-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-journal-remote-0:239-31.el8_2.7.ppc64le", product_id: "systemd-journal-remote-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-libs-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-libs-0:239-31.el8_2.7.ppc64le", product_id: "systemd-libs-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-pam-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-pam-0:239-31.el8_2.7.ppc64le", product_id: "systemd-pam-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-tests-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-tests-0:239-31.el8_2.7.ppc64le", product_id: "systemd-tests-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-udev-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-udev-0:239-31.el8_2.7.ppc64le", product_id: "systemd-udev-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-debugsource-0:239-31.el8_2.7.ppc64le", product_id: "systemd-debugsource-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "systemd-0:239-31.el8_2.7.i686", product: { name: "systemd-0:239-31.el8_2.7.i686", product_id: "systemd-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-container-0:239-31.el8_2.7.i686", product: { name: "systemd-container-0:239-31.el8_2.7.i686", product_id: "systemd-container-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-devel-0:239-31.el8_2.7.i686", product: { name: "systemd-devel-0:239-31.el8_2.7.i686", product_id: "systemd-devel-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-libs-0:239-31.el8_2.7.i686", product: { name: "systemd-libs-0:239-31.el8_2.7.i686", product_id: "systemd-libs-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-31.el8_2.7.i686", product: { name: "systemd-debugsource-0:239-31.el8_2.7.i686", product_id: "systemd-debugsource-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-container-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-libs-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-pam-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-tests-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-udev-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "systemd-0:239-31.el8_2.7.x86_64", product: { name: "systemd-0:239-31.el8_2.7.x86_64", product_id: "systemd-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-container-0:239-31.el8_2.7.x86_64", product: { name: "systemd-container-0:239-31.el8_2.7.x86_64", product_id: "systemd-container-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-devel-0:239-31.el8_2.7.x86_64", product: { name: "systemd-devel-0:239-31.el8_2.7.x86_64", product_id: "systemd-devel-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-31.el8_2.7.x86_64", product: { name: "systemd-journal-remote-0:239-31.el8_2.7.x86_64", product_id: "systemd-journal-remote-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-libs-0:239-31.el8_2.7.x86_64", product: { name: "systemd-libs-0:239-31.el8_2.7.x86_64", product_id: "systemd-libs-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-pam-0:239-31.el8_2.7.x86_64", product: { name: "systemd-pam-0:239-31.el8_2.7.x86_64", product_id: "systemd-pam-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-tests-0:239-31.el8_2.7.x86_64", product: { name: "systemd-tests-0:239-31.el8_2.7.x86_64", product_id: "systemd-tests-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-udev-0:239-31.el8_2.7.x86_64", product: { name: "systemd-udev-0:239-31.el8_2.7.x86_64", product_id: "systemd-udev-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-31.el8_2.7.x86_64", product: { name: "systemd-debugsource-0:239-31.el8_2.7.x86_64", product_id: "systemd-debugsource-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "systemd-0:239-31.el8_2.7.s390x", product: { name: "systemd-0:239-31.el8_2.7.s390x", product_id: "systemd-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-container-0:239-31.el8_2.7.s390x", product: { name: "systemd-container-0:239-31.el8_2.7.s390x", product_id: "systemd-container-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-devel-0:239-31.el8_2.7.s390x", product: { name: "systemd-devel-0:239-31.el8_2.7.s390x", product_id: "systemd-devel-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-31.el8_2.7.s390x", product: { name: "systemd-journal-remote-0:239-31.el8_2.7.s390x", product_id: "systemd-journal-remote-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-libs-0:239-31.el8_2.7.s390x", product: { name: "systemd-libs-0:239-31.el8_2.7.s390x", product_id: "systemd-libs-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-pam-0:239-31.el8_2.7.s390x", product: { name: "systemd-pam-0:239-31.el8_2.7.s390x", product_id: "systemd-pam-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-tests-0:239-31.el8_2.7.s390x", product: { name: "systemd-tests-0:239-31.el8_2.7.s390x", product_id: "systemd-tests-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-udev-0:239-31.el8_2.7.s390x", product: { name: "systemd-udev-0:239-31.el8_2.7.s390x", product_id: "systemd-udev-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-31.el8_2.7.s390x", product: { name: "systemd-debugsource-0:239-31.el8_2.7.s390x", product_id: "systemd-debugsource-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-container-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "systemd-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", }, product_reference: "systemd-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-31.el8_2.7.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", }, product_reference: "systemd-0:239-31.el8_2.7.src", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-container-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", }, product_reference: "systemd-container-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-container-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-container-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-container-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-container-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-container-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-debugsource-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", }, product_reference: "systemd-debugsource-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-debugsource-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-debugsource-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-debugsource-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-devel-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", }, product_reference: "systemd-devel-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-devel-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-devel-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-devel-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-journal-remote-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-journal-remote-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-journal-remote-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-journal-remote-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-libs-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", }, product_reference: "systemd-libs-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-libs-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-libs-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-libs-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-libs-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-pam-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-pam-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-pam-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-pam-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-pam-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-tests-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-tests-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-tests-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-tests-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-tests-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-udev-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-udev-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-udev-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-udev-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-udev-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Jann Horn", ], organization: "Google Project Zero", }, ], cve: "CVE-2019-3842", cwe: { id: "CWE-863", name: "Incorrect Authorization", }, discovery_date: "2019-01-23T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1668521", }, ], notes: [ { category: "description", text: "It was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", title: "Vulnerability description", }, { category: "summary", text: "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\"", title: "Vulnerability summary", }, { category: "other", text: "For the attack to be successful, a new session must be created by pam_systemd. This is done only if the calling process is not already part of a session. Red Hat Enterprise Linux, in its default PAM configurations, does not let a session sneak in without systemd knowing about it, since pam_systemd is always called in every PAM config file. Unless a wrong PAM config file is in place, this vulnerability cannot be triggered on Red Hat Enterprise Linux 7 and 8.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3842", }, { category: "external", summary: "RHBZ#1668521", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1668521", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3842", url: "https://www.cve.org/CVERecord?id=CVE-2019-3842", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3842", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3842", }, ], release_date: "2019-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-10-19T07:18:34+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], restart_required: { category: "machine", }, url: "https://access.redhat.com/errata/RHSA-2021:3900", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\"", }, { cve: "CVE-2020-13776", cwe: { id: "CWE-440", name: "Expected Behavior Violation", }, discovery_date: "2020-06-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1845534", }, ], notes: [ { category: "description", text: "A flaw was found in systemd, where it mishandles numerical usernames beginning with decimal digits, or \"0x\" followed by hexadecimal digits. When the usernames are used by systemd, for example in service units, an unexpected user may be used instead. In some particular configurations, this flaw allows local attackers to elevate their privileges.", title: "Vulnerability description", }, { category: "summary", text: "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits", title: "Vulnerability summary", }, { category: "other", text: "The flaw is rated as Moderate because several uncommon conditions have to be met to make it exploitable. Numerical usernames with decimal digits or starting with \"0x\" followed by hexadecimal digits must exist on the system. Systemd would need to process those particular usernames (e.g. while using the `User=` directive in a systemd service unit). If the service was supposed to run as a regular user and the binary being executed can be controlled by a local attacker, he could abuse this flaw to unexpectedly execute code as a root when the service is started. If the service was run as a regular user to limit the impact of a possible flaw in the service, this flaw would not provide the intended additional protection.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-13776", }, { category: "external", summary: "RHBZ#1845534", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1845534", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-13776", url: "https://www.cve.org/CVERecord?id=CVE-2020-13776", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-13776", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-13776", }, ], release_date: "2020-05-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-10-19T07:18:34+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], restart_required: { category: "machine", }, url: "https://access.redhat.com/errata/RHSA-2021:3900", }, { category: "workaround", details: "Do not use `User=` directive in services with numerical usernames composed by decimal digits or starting with \"0x\" followed by hexadecimal digits (e.g. 0x[0-9A-Fa-f]+).", product_ids: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits", }, ], }
RHSA-2021:3900
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for systemd is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.\n\nSecurity Fix(es):\n\n* systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\" (CVE-2019-3842)\n\n* systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits (CVE-2020-13776)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:3900", url: "https://access.redhat.com/errata/RHSA-2021:3900", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1668521", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1668521", }, { category: "external", summary: "1845534", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1845534", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3900.json", }, ], title: "Red Hat Security Advisory: systemd security update", tracking: { current_release_date: "2024-11-22T15:56:28+00:00", generator: { date: "2024-11-22T15:56:28+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:3900", initial_release_date: "2021-10-19T07:18:34+00:00", revision_history: [ { date: "2021-10-19T07:18:34+00:00", number: "1", summary: "Initial version", }, { date: "2021-10-19T07:18:34+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T15:56:28+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product: { name: "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:8.2::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "systemd-0:239-31.el8_2.7.src", product: { name: "systemd-0:239-31.el8_2.7.src", product_id: "systemd-0:239-31.el8_2.7.src", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "systemd-0:239-31.el8_2.7.aarch64", product: { name: "systemd-0:239-31.el8_2.7.aarch64", product_id: "systemd-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-container-0:239-31.el8_2.7.aarch64", product: { name: "systemd-container-0:239-31.el8_2.7.aarch64", product_id: "systemd-container-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-devel-0:239-31.el8_2.7.aarch64", product: { name: "systemd-devel-0:239-31.el8_2.7.aarch64", product_id: "systemd-devel-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-31.el8_2.7.aarch64", product: { name: "systemd-journal-remote-0:239-31.el8_2.7.aarch64", product_id: "systemd-journal-remote-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-libs-0:239-31.el8_2.7.aarch64", product: { name: "systemd-libs-0:239-31.el8_2.7.aarch64", product_id: "systemd-libs-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-pam-0:239-31.el8_2.7.aarch64", product: { name: "systemd-pam-0:239-31.el8_2.7.aarch64", product_id: "systemd-pam-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-tests-0:239-31.el8_2.7.aarch64", product: { name: "systemd-tests-0:239-31.el8_2.7.aarch64", product_id: "systemd-tests-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-udev-0:239-31.el8_2.7.aarch64", product: { name: "systemd-udev-0:239-31.el8_2.7.aarch64", product_id: "systemd-udev-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-31.el8_2.7.aarch64", product: { name: "systemd-debugsource-0:239-31.el8_2.7.aarch64", product_id: "systemd-debugsource-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "systemd-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-0:239-31.el8_2.7.ppc64le", product_id: "systemd-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-container-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-container-0:239-31.el8_2.7.ppc64le", product_id: "systemd-container-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-devel-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-devel-0:239-31.el8_2.7.ppc64le", product_id: "systemd-devel-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-journal-remote-0:239-31.el8_2.7.ppc64le", product_id: "systemd-journal-remote-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-libs-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-libs-0:239-31.el8_2.7.ppc64le", product_id: "systemd-libs-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-pam-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-pam-0:239-31.el8_2.7.ppc64le", product_id: "systemd-pam-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-tests-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-tests-0:239-31.el8_2.7.ppc64le", product_id: "systemd-tests-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-udev-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-udev-0:239-31.el8_2.7.ppc64le", product_id: "systemd-udev-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-debugsource-0:239-31.el8_2.7.ppc64le", product_id: "systemd-debugsource-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "systemd-0:239-31.el8_2.7.i686", product: { name: "systemd-0:239-31.el8_2.7.i686", product_id: "systemd-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-container-0:239-31.el8_2.7.i686", product: { name: "systemd-container-0:239-31.el8_2.7.i686", product_id: "systemd-container-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-devel-0:239-31.el8_2.7.i686", product: { name: "systemd-devel-0:239-31.el8_2.7.i686", product_id: "systemd-devel-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-libs-0:239-31.el8_2.7.i686", product: { name: "systemd-libs-0:239-31.el8_2.7.i686", product_id: "systemd-libs-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-31.el8_2.7.i686", product: { name: "systemd-debugsource-0:239-31.el8_2.7.i686", product_id: "systemd-debugsource-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-container-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-libs-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-pam-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-tests-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-udev-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "systemd-0:239-31.el8_2.7.x86_64", product: { name: "systemd-0:239-31.el8_2.7.x86_64", product_id: "systemd-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-container-0:239-31.el8_2.7.x86_64", product: { name: "systemd-container-0:239-31.el8_2.7.x86_64", product_id: "systemd-container-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-devel-0:239-31.el8_2.7.x86_64", product: { name: "systemd-devel-0:239-31.el8_2.7.x86_64", product_id: "systemd-devel-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-31.el8_2.7.x86_64", product: { name: "systemd-journal-remote-0:239-31.el8_2.7.x86_64", product_id: "systemd-journal-remote-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-libs-0:239-31.el8_2.7.x86_64", product: { name: "systemd-libs-0:239-31.el8_2.7.x86_64", product_id: "systemd-libs-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-pam-0:239-31.el8_2.7.x86_64", product: { name: "systemd-pam-0:239-31.el8_2.7.x86_64", product_id: "systemd-pam-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-tests-0:239-31.el8_2.7.x86_64", product: { name: "systemd-tests-0:239-31.el8_2.7.x86_64", product_id: "systemd-tests-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-udev-0:239-31.el8_2.7.x86_64", product: { name: "systemd-udev-0:239-31.el8_2.7.x86_64", product_id: "systemd-udev-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-31.el8_2.7.x86_64", product: { name: "systemd-debugsource-0:239-31.el8_2.7.x86_64", product_id: "systemd-debugsource-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "systemd-0:239-31.el8_2.7.s390x", product: { name: "systemd-0:239-31.el8_2.7.s390x", product_id: "systemd-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-container-0:239-31.el8_2.7.s390x", product: { name: "systemd-container-0:239-31.el8_2.7.s390x", product_id: "systemd-container-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-devel-0:239-31.el8_2.7.s390x", product: { name: "systemd-devel-0:239-31.el8_2.7.s390x", product_id: "systemd-devel-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-31.el8_2.7.s390x", product: { name: "systemd-journal-remote-0:239-31.el8_2.7.s390x", product_id: "systemd-journal-remote-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-libs-0:239-31.el8_2.7.s390x", product: { name: "systemd-libs-0:239-31.el8_2.7.s390x", product_id: "systemd-libs-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-pam-0:239-31.el8_2.7.s390x", product: { name: "systemd-pam-0:239-31.el8_2.7.s390x", product_id: "systemd-pam-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-tests-0:239-31.el8_2.7.s390x", product: { name: "systemd-tests-0:239-31.el8_2.7.s390x", product_id: "systemd-tests-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-udev-0:239-31.el8_2.7.s390x", product: { name: "systemd-udev-0:239-31.el8_2.7.s390x", product_id: "systemd-udev-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-31.el8_2.7.s390x", product: { name: "systemd-debugsource-0:239-31.el8_2.7.s390x", product_id: "systemd-debugsource-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-container-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "systemd-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", }, product_reference: "systemd-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-31.el8_2.7.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", }, product_reference: "systemd-0:239-31.el8_2.7.src", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-container-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", }, product_reference: "systemd-container-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-container-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-container-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-container-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-container-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-container-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-debugsource-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", }, product_reference: "systemd-debugsource-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-debugsource-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-debugsource-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-debugsource-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-devel-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", }, product_reference: "systemd-devel-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-devel-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-devel-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-devel-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-journal-remote-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-journal-remote-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-journal-remote-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-journal-remote-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-libs-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", }, product_reference: "systemd-libs-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-libs-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-libs-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-libs-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-libs-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-pam-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-pam-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-pam-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-pam-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-pam-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-tests-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-tests-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-tests-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-tests-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-tests-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-udev-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-udev-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-udev-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-udev-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-udev-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Jann Horn", ], organization: "Google Project Zero", }, ], cve: "CVE-2019-3842", cwe: { id: "CWE-863", name: "Incorrect Authorization", }, discovery_date: "2019-01-23T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1668521", }, ], notes: [ { category: "description", text: "It was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", title: "Vulnerability description", }, { category: "summary", text: "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\"", title: "Vulnerability summary", }, { category: "other", text: "For the attack to be successful, a new session must be created by pam_systemd. This is done only if the calling process is not already part of a session. Red Hat Enterprise Linux, in its default PAM configurations, does not let a session sneak in without systemd knowing about it, since pam_systemd is always called in every PAM config file. Unless a wrong PAM config file is in place, this vulnerability cannot be triggered on Red Hat Enterprise Linux 7 and 8.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3842", }, { category: "external", summary: "RHBZ#1668521", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1668521", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3842", url: "https://www.cve.org/CVERecord?id=CVE-2019-3842", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3842", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3842", }, ], release_date: "2019-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-10-19T07:18:34+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], restart_required: { category: "machine", }, url: "https://access.redhat.com/errata/RHSA-2021:3900", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\"", }, { cve: "CVE-2020-13776", cwe: { id: "CWE-440", name: "Expected Behavior Violation", }, discovery_date: "2020-06-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1845534", }, ], notes: [ { category: "description", text: "A flaw was found in systemd, where it mishandles numerical usernames beginning with decimal digits, or \"0x\" followed by hexadecimal digits. When the usernames are used by systemd, for example in service units, an unexpected user may be used instead. In some particular configurations, this flaw allows local attackers to elevate their privileges.", title: "Vulnerability description", }, { category: "summary", text: "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits", title: "Vulnerability summary", }, { category: "other", text: "The flaw is rated as Moderate because several uncommon conditions have to be met to make it exploitable. Numerical usernames with decimal digits or starting with \"0x\" followed by hexadecimal digits must exist on the system. Systemd would need to process those particular usernames (e.g. while using the `User=` directive in a systemd service unit). If the service was supposed to run as a regular user and the binary being executed can be controlled by a local attacker, he could abuse this flaw to unexpectedly execute code as a root when the service is started. If the service was run as a regular user to limit the impact of a possible flaw in the service, this flaw would not provide the intended additional protection.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-13776", }, { category: "external", summary: "RHBZ#1845534", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1845534", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-13776", url: "https://www.cve.org/CVERecord?id=CVE-2020-13776", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-13776", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-13776", }, ], release_date: "2020-05-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-10-19T07:18:34+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], restart_required: { category: "machine", }, url: "https://access.redhat.com/errata/RHSA-2021:3900", }, { category: "workaround", details: "Do not use `User=` directive in services with numerical usernames composed by decimal digits or starting with \"0x\" followed by hexadecimal digits (e.g. 0x[0-9A-Fa-f]+).", product_ids: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits", }, ], }
rhsa-2021_1611
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for systemd is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.\n\nSecurity Fix(es):\n\n* systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\" (CVE-2019-3842)\n\n* systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits (CVE-2020-13776)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1611", url: "https://access.redhat.com/errata/RHSA-2021:1611", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/", url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/", }, { category: "external", summary: "1668521", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1668521", }, { category: "external", summary: "1740657", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1740657", }, { category: "external", summary: "1755287", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1755287", }, { category: "external", summary: "1764282", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1764282", }, { category: "external", summary: "1812972", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1812972", }, { category: "external", summary: "1819868", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1819868", }, { category: "external", summary: "1845534", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1845534", }, { category: "external", summary: "1862714", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1862714", }, { category: "external", summary: "1865840", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1865840", }, { category: "external", summary: "1868831", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1868831", }, { category: "external", summary: "1868877", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1868877", }, { category: "external", summary: "1870638", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1870638", }, { category: "external", summary: "1871139", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1871139", }, { category: "external", summary: "1880270", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1880270", }, { category: "external", summary: "1885553", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1885553", }, { category: "external", summary: "1887181", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1887181", }, { category: "external", summary: "1888912", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1888912", }, { category: "external", summary: "1889996", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1889996", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1611.json", }, ], title: "Red Hat Security Advisory: systemd security, bug fix, and enhancement update", tracking: { current_release_date: "2024-11-22T15:56:20+00:00", generator: { date: "2024-11-22T15:56:20+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:1611", initial_release_date: "2021-05-18T15:28:44+00:00", revision_history: [ { date: "2021-05-18T15:28:44+00:00", number: "1", summary: "Initial version", }, { date: "2021-05-18T15:28:44+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T15:56:20+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 8)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:8::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "systemd-0:239-45.el8.src", product: { name: "systemd-0:239-45.el8.src", product_id: "systemd-0:239-45.el8.src", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-45.el8?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "systemd-0:239-45.el8.aarch64", product: { name: "systemd-0:239-45.el8.aarch64", product_id: "systemd-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-container-0:239-45.el8.aarch64", product: { name: "systemd-container-0:239-45.el8.aarch64", product_id: "systemd-container-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-devel-0:239-45.el8.aarch64", product: { name: "systemd-devel-0:239-45.el8.aarch64", product_id: "systemd-devel-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-45.el8.aarch64", product: { name: "systemd-journal-remote-0:239-45.el8.aarch64", product_id: "systemd-journal-remote-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-libs-0:239-45.el8.aarch64", product: { name: "systemd-libs-0:239-45.el8.aarch64", product_id: "systemd-libs-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-pam-0:239-45.el8.aarch64", product: { name: "systemd-pam-0:239-45.el8.aarch64", product_id: "systemd-pam-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-tests-0:239-45.el8.aarch64", product: { name: "systemd-tests-0:239-45.el8.aarch64", product_id: "systemd-tests-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-udev-0:239-45.el8.aarch64", product: { name: "systemd-udev-0:239-45.el8.aarch64", product_id: "systemd-udev-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-45.el8.aarch64", product: { name: "systemd-debugsource-0:239-45.el8.aarch64", product_id: "systemd-debugsource-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-container-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-container-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-libs-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-libs-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-pam-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-pam-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-tests-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-tests-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-udev-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-udev-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "systemd-0:239-45.el8.ppc64le", product: { name: "systemd-0:239-45.el8.ppc64le", product_id: "systemd-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-container-0:239-45.el8.ppc64le", product: { name: "systemd-container-0:239-45.el8.ppc64le", product_id: "systemd-container-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-devel-0:239-45.el8.ppc64le", product: { name: "systemd-devel-0:239-45.el8.ppc64le", product_id: "systemd-devel-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-45.el8.ppc64le", product: { name: "systemd-journal-remote-0:239-45.el8.ppc64le", product_id: "systemd-journal-remote-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-libs-0:239-45.el8.ppc64le", product: { name: "systemd-libs-0:239-45.el8.ppc64le", product_id: "systemd-libs-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-pam-0:239-45.el8.ppc64le", product: { name: "systemd-pam-0:239-45.el8.ppc64le", product_id: "systemd-pam-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-tests-0:239-45.el8.ppc64le", product: { name: "systemd-tests-0:239-45.el8.ppc64le", product_id: "systemd-tests-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-udev-0:239-45.el8.ppc64le", product: { name: "systemd-udev-0:239-45.el8.ppc64le", product_id: "systemd-udev-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-45.el8.ppc64le", product: { name: "systemd-debugsource-0:239-45.el8.ppc64le", product_id: "systemd-debugsource-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-container-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-container-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-libs-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-libs-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-pam-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-pam-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-tests-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-tests-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-udev-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-udev-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "systemd-0:239-45.el8.i686", product: { name: "systemd-0:239-45.el8.i686", product_id: "systemd-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-container-0:239-45.el8.i686", product: { name: "systemd-container-0:239-45.el8.i686", product_id: "systemd-container-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-devel-0:239-45.el8.i686", product: { name: "systemd-devel-0:239-45.el8.i686", product_id: "systemd-devel-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-libs-0:239-45.el8.i686", product: { name: "systemd-libs-0:239-45.el8.i686", product_id: "systemd-libs-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-45.el8.i686", product: { name: "systemd-debugsource-0:239-45.el8.i686", product_id: "systemd-debugsource-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-45.el8.i686", product: { name: "systemd-container-debuginfo-0:239-45.el8.i686", product_id: "systemd-container-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-45.el8.i686", product: { name: "systemd-debuginfo-0:239-45.el8.i686", product_id: "systemd-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-45.el8.i686", product: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.i686", product_id: "systemd-journal-remote-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-45.el8.i686", product: { name: "systemd-libs-debuginfo-0:239-45.el8.i686", product_id: "systemd-libs-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-45.el8.i686", product: { name: "systemd-pam-debuginfo-0:239-45.el8.i686", product_id: "systemd-pam-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-45.el8.i686", product: { name: "systemd-tests-debuginfo-0:239-45.el8.i686", product_id: "systemd-tests-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-45.el8.i686", product: { name: "systemd-udev-debuginfo-0:239-45.el8.i686", product_id: "systemd-udev-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "systemd-0:239-45.el8.x86_64", product: { name: "systemd-0:239-45.el8.x86_64", product_id: "systemd-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-container-0:239-45.el8.x86_64", product: { name: "systemd-container-0:239-45.el8.x86_64", product_id: "systemd-container-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-devel-0:239-45.el8.x86_64", product: { name: "systemd-devel-0:239-45.el8.x86_64", product_id: "systemd-devel-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-45.el8.x86_64", product: { name: "systemd-journal-remote-0:239-45.el8.x86_64", product_id: "systemd-journal-remote-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-libs-0:239-45.el8.x86_64", product: { name: "systemd-libs-0:239-45.el8.x86_64", product_id: "systemd-libs-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-pam-0:239-45.el8.x86_64", product: { name: "systemd-pam-0:239-45.el8.x86_64", product_id: "systemd-pam-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-tests-0:239-45.el8.x86_64", product: { name: "systemd-tests-0:239-45.el8.x86_64", product_id: "systemd-tests-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-udev-0:239-45.el8.x86_64", product: { name: "systemd-udev-0:239-45.el8.x86_64", product_id: "systemd-udev-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-45.el8.x86_64", product: { name: "systemd-debugsource-0:239-45.el8.x86_64", product_id: "systemd-debugsource-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-container-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-container-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-libs-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-libs-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-pam-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-pam-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-tests-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-tests-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-udev-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-udev-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "systemd-0:239-45.el8.s390x", product: { name: "systemd-0:239-45.el8.s390x", product_id: "systemd-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-container-0:239-45.el8.s390x", product: { name: "systemd-container-0:239-45.el8.s390x", product_id: "systemd-container-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-devel-0:239-45.el8.s390x", product: { name: "systemd-devel-0:239-45.el8.s390x", product_id: "systemd-devel-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-45.el8.s390x", product: { name: "systemd-journal-remote-0:239-45.el8.s390x", product_id: "systemd-journal-remote-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-libs-0:239-45.el8.s390x", product: { name: "systemd-libs-0:239-45.el8.s390x", product_id: "systemd-libs-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-pam-0:239-45.el8.s390x", product: { name: "systemd-pam-0:239-45.el8.s390x", product_id: "systemd-pam-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-tests-0:239-45.el8.s390x", product: { name: "systemd-tests-0:239-45.el8.s390x", product_id: "systemd-tests-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-udev-0:239-45.el8.s390x", product: { name: "systemd-udev-0:239-45.el8.s390x", product_id: "systemd-udev-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-45.el8.s390x", product: { name: "systemd-debugsource-0:239-45.el8.s390x", product_id: "systemd-debugsource-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-container-debuginfo-0:239-45.el8.s390x", product_id: "systemd-container-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-debuginfo-0:239-45.el8.s390x", product_id: "systemd-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.s390x", product_id: "systemd-journal-remote-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-libs-debuginfo-0:239-45.el8.s390x", product_id: "systemd-libs-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-pam-debuginfo-0:239-45.el8.s390x", product_id: "systemd-pam-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-tests-debuginfo-0:239-45.el8.s390x", product_id: "systemd-tests-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-udev-debuginfo-0:239-45.el8.s390x", product_id: "systemd-udev-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "systemd-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", }, product_reference: "systemd-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", }, product_reference: "systemd-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", }, product_reference: "systemd-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", }, product_reference: "systemd-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-45.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", }, product_reference: "systemd-0:239-45.el8.src", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", }, product_reference: "systemd-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", }, product_reference: "systemd-container-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", }, product_reference: "systemd-container-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", }, product_reference: "systemd-container-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", }, product_reference: "systemd-container-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", }, product_reference: "systemd-container-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-container-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-container-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-container-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-container-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-container-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", }, product_reference: "systemd-debugsource-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", }, product_reference: "systemd-debugsource-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", }, product_reference: "systemd-debugsource-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", }, product_reference: "systemd-debugsource-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", }, product_reference: "systemd-debugsource-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", }, product_reference: "systemd-devel-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", }, product_reference: "systemd-devel-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", }, product_reference: "systemd-devel-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", }, product_reference: "systemd-devel-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", }, product_reference: "systemd-devel-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", }, product_reference: "systemd-journal-remote-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", }, product_reference: "systemd-journal-remote-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", }, product_reference: "systemd-journal-remote-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", }, product_reference: "systemd-journal-remote-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-journal-remote-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-journal-remote-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", }, product_reference: "systemd-libs-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", }, product_reference: "systemd-libs-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", }, product_reference: "systemd-libs-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", }, product_reference: "systemd-libs-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", }, product_reference: "systemd-libs-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-libs-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-libs-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-libs-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-libs-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-libs-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", }, product_reference: "systemd-pam-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", }, product_reference: "systemd-pam-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", }, product_reference: "systemd-pam-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", }, product_reference: "systemd-pam-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-pam-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-pam-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-pam-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-pam-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-pam-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", }, product_reference: "systemd-tests-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", }, product_reference: "systemd-tests-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", }, product_reference: "systemd-tests-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", }, product_reference: "systemd-tests-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-tests-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-tests-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-tests-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-tests-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-tests-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", }, product_reference: "systemd-udev-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", }, product_reference: "systemd-udev-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", }, product_reference: "systemd-udev-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", }, product_reference: "systemd-udev-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-udev-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-udev-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-udev-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-udev-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-udev-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Jann Horn", ], organization: "Google Project Zero", }, ], cve: "CVE-2019-3842", cwe: { id: "CWE-863", name: "Incorrect Authorization", }, discovery_date: "2019-01-23T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1668521", }, ], notes: [ { category: "description", text: "It was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", title: "Vulnerability description", }, { category: "summary", text: "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\"", title: "Vulnerability summary", }, { category: "other", text: "For the attack to be successful, a new session must be created by pam_systemd. This is done only if the calling process is not already part of a session. Red Hat Enterprise Linux, in its default PAM configurations, does not let a session sneak in without systemd knowing about it, since pam_systemd is always called in every PAM config file. Unless a wrong PAM config file is in place, this vulnerability cannot be triggered on Red Hat Enterprise Linux 7 and 8.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3842", }, { category: "external", summary: "RHBZ#1668521", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1668521", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3842", url: "https://www.cve.org/CVERecord?id=CVE-2019-3842", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3842", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3842", }, ], release_date: "2019-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-05-18T15:28:44+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], restart_required: { category: "machine", }, url: "https://access.redhat.com/errata/RHSA-2021:1611", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\"", }, { cve: "CVE-2020-13776", cwe: { id: "CWE-440", name: "Expected Behavior Violation", }, discovery_date: "2020-06-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1845534", }, ], notes: [ { category: "description", text: "A flaw was found in systemd, where it mishandles numerical usernames beginning with decimal digits, or \"0x\" followed by hexadecimal digits. When the usernames are used by systemd, for example in service units, an unexpected user may be used instead. In some particular configurations, this flaw allows local attackers to elevate their privileges.", title: "Vulnerability description", }, { category: "summary", text: "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits", title: "Vulnerability summary", }, { category: "other", text: "The flaw is rated as Moderate because several uncommon conditions have to be met to make it exploitable. Numerical usernames with decimal digits or starting with \"0x\" followed by hexadecimal digits must exist on the system. Systemd would need to process those particular usernames (e.g. while using the `User=` directive in a systemd service unit). If the service was supposed to run as a regular user and the binary being executed can be controlled by a local attacker, he could abuse this flaw to unexpectedly execute code as a root when the service is started. If the service was run as a regular user to limit the impact of a possible flaw in the service, this flaw would not provide the intended additional protection.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-13776", }, { category: "external", summary: "RHBZ#1845534", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1845534", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-13776", url: "https://www.cve.org/CVERecord?id=CVE-2020-13776", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-13776", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-13776", }, ], release_date: "2020-05-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-05-18T15:28:44+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], restart_required: { category: "machine", }, url: "https://access.redhat.com/errata/RHSA-2021:1611", }, { category: "workaround", details: "Do not use `User=` directive in services with numerical usernames composed by decimal digits or starting with \"0x\" followed by hexadecimal digits (e.g. 0x[0-9A-Fa-f]+).", product_ids: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits", }, ], }
rhsa-2021:1611
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for systemd is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.\n\nSecurity Fix(es):\n\n* systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\" (CVE-2019-3842)\n\n* systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits (CVE-2020-13776)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1611", url: "https://access.redhat.com/errata/RHSA-2021:1611", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/", url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/", }, { category: "external", summary: "1668521", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1668521", }, { category: "external", summary: "1740657", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1740657", }, { category: "external", summary: "1755287", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1755287", }, { category: "external", summary: "1764282", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1764282", }, { category: "external", summary: "1812972", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1812972", }, { category: "external", summary: "1819868", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1819868", }, { category: "external", summary: "1845534", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1845534", }, { category: "external", summary: "1862714", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1862714", }, { category: "external", summary: "1865840", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1865840", }, { category: "external", summary: "1868831", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1868831", }, { category: "external", summary: "1868877", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1868877", }, { category: "external", summary: "1870638", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1870638", }, { category: "external", summary: "1871139", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1871139", }, { category: "external", summary: "1880270", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1880270", }, { category: "external", summary: "1885553", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1885553", }, { category: "external", summary: "1887181", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1887181", }, { category: "external", summary: "1888912", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1888912", }, { category: "external", summary: "1889996", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1889996", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1611.json", }, ], title: "Red Hat Security Advisory: systemd security, bug fix, and enhancement update", tracking: { current_release_date: "2025-03-19T15:34:53+00:00", generator: { date: "2025-03-19T15:34:53+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2021:1611", initial_release_date: "2021-05-18T15:28:44+00:00", revision_history: [ { date: "2021-05-18T15:28:44+00:00", number: "1", summary: "Initial version", }, { date: "2021-05-18T15:28:44+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-19T15:34:53+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 8)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:8::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "systemd-0:239-45.el8.src", product: { name: "systemd-0:239-45.el8.src", product_id: "systemd-0:239-45.el8.src", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-45.el8?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "systemd-0:239-45.el8.aarch64", product: { name: "systemd-0:239-45.el8.aarch64", product_id: "systemd-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-container-0:239-45.el8.aarch64", product: { name: "systemd-container-0:239-45.el8.aarch64", product_id: "systemd-container-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-devel-0:239-45.el8.aarch64", product: { name: "systemd-devel-0:239-45.el8.aarch64", product_id: "systemd-devel-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-45.el8.aarch64", product: { name: "systemd-journal-remote-0:239-45.el8.aarch64", product_id: "systemd-journal-remote-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-libs-0:239-45.el8.aarch64", product: { name: "systemd-libs-0:239-45.el8.aarch64", product_id: "systemd-libs-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-pam-0:239-45.el8.aarch64", product: { name: "systemd-pam-0:239-45.el8.aarch64", product_id: "systemd-pam-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-tests-0:239-45.el8.aarch64", product: { name: "systemd-tests-0:239-45.el8.aarch64", product_id: "systemd-tests-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-udev-0:239-45.el8.aarch64", product: { name: "systemd-udev-0:239-45.el8.aarch64", product_id: "systemd-udev-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-45.el8.aarch64", product: { name: "systemd-debugsource-0:239-45.el8.aarch64", product_id: "systemd-debugsource-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-container-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-container-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-libs-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-libs-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-pam-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-pam-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-tests-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-tests-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-udev-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-udev-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "systemd-0:239-45.el8.ppc64le", product: { name: "systemd-0:239-45.el8.ppc64le", product_id: "systemd-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-container-0:239-45.el8.ppc64le", product: { name: "systemd-container-0:239-45.el8.ppc64le", product_id: "systemd-container-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-devel-0:239-45.el8.ppc64le", product: { name: "systemd-devel-0:239-45.el8.ppc64le", product_id: "systemd-devel-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-45.el8.ppc64le", product: { name: "systemd-journal-remote-0:239-45.el8.ppc64le", product_id: "systemd-journal-remote-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-libs-0:239-45.el8.ppc64le", product: { name: "systemd-libs-0:239-45.el8.ppc64le", product_id: "systemd-libs-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-pam-0:239-45.el8.ppc64le", product: { name: "systemd-pam-0:239-45.el8.ppc64le", product_id: "systemd-pam-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-tests-0:239-45.el8.ppc64le", product: { name: "systemd-tests-0:239-45.el8.ppc64le", product_id: "systemd-tests-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-udev-0:239-45.el8.ppc64le", product: { name: "systemd-udev-0:239-45.el8.ppc64le", product_id: "systemd-udev-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-45.el8.ppc64le", product: { name: "systemd-debugsource-0:239-45.el8.ppc64le", product_id: "systemd-debugsource-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-container-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-container-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-libs-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-libs-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-pam-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-pam-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-tests-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-tests-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-udev-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-udev-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "systemd-0:239-45.el8.i686", product: { name: "systemd-0:239-45.el8.i686", product_id: "systemd-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-container-0:239-45.el8.i686", product: { name: "systemd-container-0:239-45.el8.i686", product_id: "systemd-container-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-devel-0:239-45.el8.i686", product: { name: "systemd-devel-0:239-45.el8.i686", product_id: "systemd-devel-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-libs-0:239-45.el8.i686", product: { name: "systemd-libs-0:239-45.el8.i686", product_id: "systemd-libs-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-45.el8.i686", product: { name: "systemd-debugsource-0:239-45.el8.i686", product_id: "systemd-debugsource-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-45.el8.i686", product: { name: "systemd-container-debuginfo-0:239-45.el8.i686", product_id: "systemd-container-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-45.el8.i686", product: { name: "systemd-debuginfo-0:239-45.el8.i686", product_id: "systemd-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-45.el8.i686", product: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.i686", product_id: "systemd-journal-remote-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-45.el8.i686", product: { name: "systemd-libs-debuginfo-0:239-45.el8.i686", product_id: "systemd-libs-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-45.el8.i686", product: { name: "systemd-pam-debuginfo-0:239-45.el8.i686", product_id: "systemd-pam-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-45.el8.i686", product: { name: "systemd-tests-debuginfo-0:239-45.el8.i686", product_id: "systemd-tests-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-45.el8.i686", product: { name: "systemd-udev-debuginfo-0:239-45.el8.i686", product_id: "systemd-udev-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "systemd-0:239-45.el8.x86_64", product: { name: "systemd-0:239-45.el8.x86_64", product_id: "systemd-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-container-0:239-45.el8.x86_64", product: { name: "systemd-container-0:239-45.el8.x86_64", product_id: "systemd-container-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-devel-0:239-45.el8.x86_64", product: { name: "systemd-devel-0:239-45.el8.x86_64", product_id: "systemd-devel-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-45.el8.x86_64", product: { name: "systemd-journal-remote-0:239-45.el8.x86_64", product_id: "systemd-journal-remote-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-libs-0:239-45.el8.x86_64", product: { name: "systemd-libs-0:239-45.el8.x86_64", product_id: "systemd-libs-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-pam-0:239-45.el8.x86_64", product: { name: "systemd-pam-0:239-45.el8.x86_64", product_id: "systemd-pam-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-tests-0:239-45.el8.x86_64", product: { name: "systemd-tests-0:239-45.el8.x86_64", product_id: "systemd-tests-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-udev-0:239-45.el8.x86_64", product: { name: "systemd-udev-0:239-45.el8.x86_64", product_id: "systemd-udev-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-45.el8.x86_64", product: { name: "systemd-debugsource-0:239-45.el8.x86_64", product_id: "systemd-debugsource-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-container-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-container-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-libs-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-libs-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-pam-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-pam-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-tests-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-tests-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-udev-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-udev-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "systemd-0:239-45.el8.s390x", product: { name: "systemd-0:239-45.el8.s390x", product_id: "systemd-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-container-0:239-45.el8.s390x", product: { name: "systemd-container-0:239-45.el8.s390x", product_id: "systemd-container-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-devel-0:239-45.el8.s390x", product: { name: "systemd-devel-0:239-45.el8.s390x", product_id: "systemd-devel-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-45.el8.s390x", product: { name: "systemd-journal-remote-0:239-45.el8.s390x", product_id: "systemd-journal-remote-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-libs-0:239-45.el8.s390x", product: { name: "systemd-libs-0:239-45.el8.s390x", product_id: "systemd-libs-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-pam-0:239-45.el8.s390x", product: { name: "systemd-pam-0:239-45.el8.s390x", product_id: "systemd-pam-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-tests-0:239-45.el8.s390x", product: { name: "systemd-tests-0:239-45.el8.s390x", product_id: "systemd-tests-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-udev-0:239-45.el8.s390x", product: { name: "systemd-udev-0:239-45.el8.s390x", product_id: "systemd-udev-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-45.el8.s390x", product: { name: "systemd-debugsource-0:239-45.el8.s390x", product_id: "systemd-debugsource-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-container-debuginfo-0:239-45.el8.s390x", product_id: "systemd-container-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-debuginfo-0:239-45.el8.s390x", product_id: "systemd-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.s390x", product_id: "systemd-journal-remote-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-libs-debuginfo-0:239-45.el8.s390x", product_id: "systemd-libs-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-pam-debuginfo-0:239-45.el8.s390x", product_id: "systemd-pam-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-tests-debuginfo-0:239-45.el8.s390x", product_id: "systemd-tests-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-udev-debuginfo-0:239-45.el8.s390x", product_id: "systemd-udev-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "systemd-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", }, product_reference: "systemd-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", }, product_reference: "systemd-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", }, product_reference: "systemd-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", }, product_reference: "systemd-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-45.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", }, product_reference: "systemd-0:239-45.el8.src", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", }, product_reference: "systemd-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", }, product_reference: "systemd-container-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", }, product_reference: "systemd-container-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", }, product_reference: "systemd-container-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", }, product_reference: "systemd-container-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", }, product_reference: "systemd-container-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-container-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-container-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-container-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-container-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-container-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", }, product_reference: "systemd-debugsource-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", }, product_reference: "systemd-debugsource-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", }, product_reference: "systemd-debugsource-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", }, product_reference: "systemd-debugsource-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", }, product_reference: "systemd-debugsource-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", }, product_reference: "systemd-devel-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", }, product_reference: "systemd-devel-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", }, product_reference: "systemd-devel-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", }, product_reference: "systemd-devel-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", }, product_reference: "systemd-devel-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", }, product_reference: "systemd-journal-remote-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", }, product_reference: "systemd-journal-remote-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", }, product_reference: "systemd-journal-remote-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", }, product_reference: "systemd-journal-remote-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-journal-remote-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-journal-remote-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", }, product_reference: "systemd-libs-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", }, product_reference: "systemd-libs-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", }, product_reference: "systemd-libs-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", }, product_reference: "systemd-libs-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", }, product_reference: "systemd-libs-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-libs-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-libs-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-libs-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-libs-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-libs-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", }, product_reference: "systemd-pam-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", }, product_reference: "systemd-pam-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", }, product_reference: "systemd-pam-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", }, product_reference: "systemd-pam-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-pam-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-pam-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-pam-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-pam-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-pam-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", }, product_reference: "systemd-tests-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", }, product_reference: "systemd-tests-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", }, product_reference: "systemd-tests-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", }, product_reference: "systemd-tests-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-tests-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-tests-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-tests-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-tests-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-tests-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", }, product_reference: "systemd-udev-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", }, product_reference: "systemd-udev-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", }, product_reference: "systemd-udev-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", }, product_reference: "systemd-udev-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-udev-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-udev-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-udev-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-udev-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-udev-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Jann Horn", ], organization: "Google Project Zero", }, ], cve: "CVE-2019-3842", cwe: { id: "CWE-863", name: "Incorrect Authorization", }, discovery_date: "2019-01-23T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1668521", }, ], notes: [ { category: "description", text: "It was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", title: "Vulnerability description", }, { category: "summary", text: "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\"", title: "Vulnerability summary", }, { category: "other", text: "For the attack to be successful, a new session must be created by pam_systemd. This is done only if the calling process is not already part of a session. Red Hat Enterprise Linux, in its default PAM configurations, does not let a session sneak in without systemd knowing about it, since pam_systemd is always called in every PAM config file. Unless a wrong PAM config file is in place, this vulnerability cannot be triggered on Red Hat Enterprise Linux 7 and 8.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3842", }, { category: "external", summary: "RHBZ#1668521", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1668521", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3842", url: "https://www.cve.org/CVERecord?id=CVE-2019-3842", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3842", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3842", }, ], release_date: "2019-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-05-18T15:28:44+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], restart_required: { category: "machine", }, url: "https://access.redhat.com/errata/RHSA-2021:1611", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\"", }, { cve: "CVE-2020-13776", cwe: { id: "CWE-440", name: "Expected Behavior Violation", }, discovery_date: "2020-06-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1845534", }, ], notes: [ { category: "description", text: "A flaw was found in systemd, where it mishandles numerical usernames beginning with decimal digits, or \"0x\" followed by hexadecimal digits. When the usernames are used by systemd, for example in service units, an unexpected user may be used instead. In some particular configurations, this flaw allows local attackers to elevate their privileges.", title: "Vulnerability description", }, { category: "summary", text: "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits", title: "Vulnerability summary", }, { category: "other", text: "The flaw is rated as Moderate because several uncommon conditions have to be met to make it exploitable. Numerical usernames with decimal digits or starting with \"0x\" followed by hexadecimal digits must exist on the system. Systemd would need to process those particular usernames (e.g. while using the `User=` directive in a systemd service unit). If the service was supposed to run as a regular user and the binary being executed can be controlled by a local attacker, he could abuse this flaw to unexpectedly execute code as a root when the service is started. If the service was run as a regular user to limit the impact of a possible flaw in the service, this flaw would not provide the intended additional protection.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-13776", }, { category: "external", summary: "RHBZ#1845534", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1845534", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-13776", url: "https://www.cve.org/CVERecord?id=CVE-2020-13776", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-13776", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-13776", }, ], release_date: "2020-05-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-05-18T15:28:44+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], restart_required: { category: "machine", }, url: "https://access.redhat.com/errata/RHSA-2021:1611", }, { category: "workaround", details: "Do not use `User=` directive in services with numerical usernames composed by decimal digits or starting with \"0x\" followed by hexadecimal digits (e.g. 0x[0-9A-Fa-f]+).", product_ids: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits", }, ], }
RHSA-2021:1611
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for systemd is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.\n\nSecurity Fix(es):\n\n* systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\" (CVE-2019-3842)\n\n* systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits (CVE-2020-13776)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:1611", url: "https://access.redhat.com/errata/RHSA-2021:1611", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/", url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/", }, { category: "external", summary: "1668521", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1668521", }, { category: "external", summary: "1740657", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1740657", }, { category: "external", summary: "1755287", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1755287", }, { category: "external", summary: "1764282", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1764282", }, { category: "external", summary: "1812972", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1812972", }, { category: "external", summary: "1819868", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1819868", }, { category: "external", summary: "1845534", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1845534", }, { category: "external", summary: "1862714", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1862714", }, { category: "external", summary: "1865840", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1865840", }, { category: "external", summary: "1868831", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1868831", }, { category: "external", summary: "1868877", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1868877", }, { category: "external", summary: "1870638", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1870638", }, { category: "external", summary: "1871139", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1871139", }, { category: "external", summary: "1880270", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1880270", }, { category: "external", summary: "1885553", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1885553", }, { category: "external", summary: "1887181", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1887181", }, { category: "external", summary: "1888912", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1888912", }, { category: "external", summary: "1889996", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1889996", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1611.json", }, ], title: "Red Hat Security Advisory: systemd security, bug fix, and enhancement update", tracking: { current_release_date: "2025-03-19T15:34:53+00:00", generator: { date: "2025-03-19T15:34:53+00:00", engine: { name: "Red Hat SDEngine", version: "4.4.1", }, }, id: "RHSA-2021:1611", initial_release_date: "2021-05-18T15:28:44+00:00", revision_history: [ { date: "2021-05-18T15:28:44+00:00", number: "1", summary: "Initial version", }, { date: "2021-05-18T15:28:44+00:00", number: "2", summary: "Last updated version", }, { date: "2025-03-19T15:34:53+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux BaseOS (v. 8)", product: { name: "Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:8::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "systemd-0:239-45.el8.src", product: { name: "systemd-0:239-45.el8.src", product_id: "systemd-0:239-45.el8.src", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-45.el8?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "systemd-0:239-45.el8.aarch64", product: { name: "systemd-0:239-45.el8.aarch64", product_id: "systemd-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-container-0:239-45.el8.aarch64", product: { name: "systemd-container-0:239-45.el8.aarch64", product_id: "systemd-container-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-devel-0:239-45.el8.aarch64", product: { name: "systemd-devel-0:239-45.el8.aarch64", product_id: "systemd-devel-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-45.el8.aarch64", product: { name: "systemd-journal-remote-0:239-45.el8.aarch64", product_id: "systemd-journal-remote-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-libs-0:239-45.el8.aarch64", product: { name: "systemd-libs-0:239-45.el8.aarch64", product_id: "systemd-libs-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-pam-0:239-45.el8.aarch64", product: { name: "systemd-pam-0:239-45.el8.aarch64", product_id: "systemd-pam-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-tests-0:239-45.el8.aarch64", product: { name: "systemd-tests-0:239-45.el8.aarch64", product_id: "systemd-tests-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-udev-0:239-45.el8.aarch64", product: { name: "systemd-udev-0:239-45.el8.aarch64", product_id: "systemd-udev-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-45.el8.aarch64", product: { name: "systemd-debugsource-0:239-45.el8.aarch64", product_id: "systemd-debugsource-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-container-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-container-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-libs-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-libs-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-pam-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-pam-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-tests-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-tests-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-45.el8.aarch64", product: { name: "systemd-udev-debuginfo-0:239-45.el8.aarch64", product_id: "systemd-udev-debuginfo-0:239-45.el8.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "systemd-0:239-45.el8.ppc64le", product: { name: "systemd-0:239-45.el8.ppc64le", product_id: "systemd-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-container-0:239-45.el8.ppc64le", product: { name: "systemd-container-0:239-45.el8.ppc64le", product_id: "systemd-container-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-devel-0:239-45.el8.ppc64le", product: { name: "systemd-devel-0:239-45.el8.ppc64le", product_id: "systemd-devel-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-45.el8.ppc64le", product: { name: "systemd-journal-remote-0:239-45.el8.ppc64le", product_id: "systemd-journal-remote-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-libs-0:239-45.el8.ppc64le", product: { name: "systemd-libs-0:239-45.el8.ppc64le", product_id: "systemd-libs-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-pam-0:239-45.el8.ppc64le", product: { name: "systemd-pam-0:239-45.el8.ppc64le", product_id: "systemd-pam-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-tests-0:239-45.el8.ppc64le", product: { name: "systemd-tests-0:239-45.el8.ppc64le", product_id: "systemd-tests-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-udev-0:239-45.el8.ppc64le", product: { name: "systemd-udev-0:239-45.el8.ppc64le", product_id: "systemd-udev-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-45.el8.ppc64le", product: { name: "systemd-debugsource-0:239-45.el8.ppc64le", product_id: "systemd-debugsource-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-container-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-container-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-libs-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-libs-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-pam-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-pam-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-tests-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-tests-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-45.el8.ppc64le", product: { name: "systemd-udev-debuginfo-0:239-45.el8.ppc64le", product_id: "systemd-udev-debuginfo-0:239-45.el8.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "systemd-0:239-45.el8.i686", product: { name: "systemd-0:239-45.el8.i686", product_id: "systemd-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-container-0:239-45.el8.i686", product: { name: "systemd-container-0:239-45.el8.i686", product_id: "systemd-container-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-devel-0:239-45.el8.i686", product: { name: "systemd-devel-0:239-45.el8.i686", product_id: "systemd-devel-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-libs-0:239-45.el8.i686", product: { name: "systemd-libs-0:239-45.el8.i686", product_id: "systemd-libs-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-45.el8.i686", product: { name: "systemd-debugsource-0:239-45.el8.i686", product_id: "systemd-debugsource-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-45.el8.i686", product: { name: "systemd-container-debuginfo-0:239-45.el8.i686", product_id: "systemd-container-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-45.el8.i686", product: { name: "systemd-debuginfo-0:239-45.el8.i686", product_id: "systemd-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-45.el8.i686", product: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.i686", product_id: "systemd-journal-remote-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-45.el8.i686", product: { name: "systemd-libs-debuginfo-0:239-45.el8.i686", product_id: "systemd-libs-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-45.el8.i686", product: { name: "systemd-pam-debuginfo-0:239-45.el8.i686", product_id: "systemd-pam-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-45.el8.i686", product: { name: "systemd-tests-debuginfo-0:239-45.el8.i686", product_id: "systemd-tests-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=i686", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-45.el8.i686", product: { name: "systemd-udev-debuginfo-0:239-45.el8.i686", product_id: "systemd-udev-debuginfo-0:239-45.el8.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "systemd-0:239-45.el8.x86_64", product: { name: "systemd-0:239-45.el8.x86_64", product_id: "systemd-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-container-0:239-45.el8.x86_64", product: { name: "systemd-container-0:239-45.el8.x86_64", product_id: "systemd-container-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-devel-0:239-45.el8.x86_64", product: { name: "systemd-devel-0:239-45.el8.x86_64", product_id: "systemd-devel-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-45.el8.x86_64", product: { name: "systemd-journal-remote-0:239-45.el8.x86_64", product_id: "systemd-journal-remote-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-libs-0:239-45.el8.x86_64", product: { name: "systemd-libs-0:239-45.el8.x86_64", product_id: "systemd-libs-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-pam-0:239-45.el8.x86_64", product: { name: "systemd-pam-0:239-45.el8.x86_64", product_id: "systemd-pam-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-tests-0:239-45.el8.x86_64", product: { name: "systemd-tests-0:239-45.el8.x86_64", product_id: "systemd-tests-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-udev-0:239-45.el8.x86_64", product: { name: "systemd-udev-0:239-45.el8.x86_64", product_id: "systemd-udev-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-45.el8.x86_64", product: { name: "systemd-debugsource-0:239-45.el8.x86_64", product_id: "systemd-debugsource-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-container-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-container-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-libs-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-libs-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-pam-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-pam-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-tests-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-tests-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-45.el8.x86_64", product: { name: "systemd-udev-debuginfo-0:239-45.el8.x86_64", product_id: "systemd-udev-debuginfo-0:239-45.el8.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "systemd-0:239-45.el8.s390x", product: { name: "systemd-0:239-45.el8.s390x", product_id: "systemd-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-container-0:239-45.el8.s390x", product: { name: "systemd-container-0:239-45.el8.s390x", product_id: "systemd-container-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-devel-0:239-45.el8.s390x", product: { name: "systemd-devel-0:239-45.el8.s390x", product_id: "systemd-devel-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-45.el8.s390x", product: { name: "systemd-journal-remote-0:239-45.el8.s390x", product_id: "systemd-journal-remote-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-libs-0:239-45.el8.s390x", product: { name: "systemd-libs-0:239-45.el8.s390x", product_id: "systemd-libs-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-pam-0:239-45.el8.s390x", product: { name: "systemd-pam-0:239-45.el8.s390x", product_id: "systemd-pam-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-tests-0:239-45.el8.s390x", product: { name: "systemd-tests-0:239-45.el8.s390x", product_id: "systemd-tests-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-udev-0:239-45.el8.s390x", product: { name: "systemd-udev-0:239-45.el8.s390x", product_id: "systemd-udev-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-45.el8.s390x", product: { name: "systemd-debugsource-0:239-45.el8.s390x", product_id: "systemd-debugsource-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-container-debuginfo-0:239-45.el8.s390x", product_id: "systemd-container-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-debuginfo-0:239-45.el8.s390x", product_id: "systemd-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.s390x", product_id: "systemd-journal-remote-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-libs-debuginfo-0:239-45.el8.s390x", product_id: "systemd-libs-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-pam-debuginfo-0:239-45.el8.s390x", product_id: "systemd-pam-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-tests-debuginfo-0:239-45.el8.s390x", product_id: "systemd-tests-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=s390x", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-45.el8.s390x", product: { name: "systemd-udev-debuginfo-0:239-45.el8.s390x", product_id: "systemd-udev-debuginfo-0:239-45.el8.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "systemd-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", }, product_reference: "systemd-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", }, product_reference: "systemd-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", }, product_reference: "systemd-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", }, product_reference: "systemd-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-45.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", }, product_reference: "systemd-0:239-45.el8.src", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", }, product_reference: "systemd-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", }, product_reference: "systemd-container-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", }, product_reference: "systemd-container-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", }, product_reference: "systemd-container-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", }, product_reference: "systemd-container-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", }, product_reference: "systemd-container-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-container-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-container-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-container-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-container-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-container-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", }, product_reference: "systemd-debugsource-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", }, product_reference: "systemd-debugsource-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", }, product_reference: "systemd-debugsource-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", }, product_reference: "systemd-debugsource-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", }, product_reference: "systemd-debugsource-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", }, product_reference: "systemd-devel-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", }, product_reference: "systemd-devel-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", }, product_reference: "systemd-devel-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", }, product_reference: "systemd-devel-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", }, product_reference: "systemd-devel-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", }, product_reference: "systemd-journal-remote-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", }, product_reference: "systemd-journal-remote-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", }, product_reference: "systemd-journal-remote-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", }, product_reference: "systemd-journal-remote-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-journal-remote-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-journal-remote-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", }, product_reference: "systemd-libs-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", }, product_reference: "systemd-libs-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", }, product_reference: "systemd-libs-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", }, product_reference: "systemd-libs-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", }, product_reference: "systemd-libs-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-libs-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-libs-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-libs-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-libs-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-libs-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", }, product_reference: "systemd-pam-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", }, product_reference: "systemd-pam-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", }, product_reference: "systemd-pam-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", }, product_reference: "systemd-pam-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-pam-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-pam-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-pam-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-pam-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-pam-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", }, product_reference: "systemd-tests-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", }, product_reference: "systemd-tests-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", }, product_reference: "systemd-tests-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", }, product_reference: "systemd-tests-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-tests-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-tests-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-tests-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-tests-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-tests-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", }, product_reference: "systemd-udev-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", }, product_reference: "systemd-udev-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", }, product_reference: "systemd-udev-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", }, product_reference: "systemd-udev-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", }, product_reference: "systemd-udev-debuginfo-0:239-45.el8.aarch64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", }, product_reference: "systemd-udev-debuginfo-0:239-45.el8.i686", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", }, product_reference: "systemd-udev-debuginfo-0:239-45.el8.ppc64le", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", }, product_reference: "systemd-udev-debuginfo-0:239-45.el8.s390x", relates_to_product_reference: "BaseOS-8.4.0.GA", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", product_id: "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", }, product_reference: "systemd-udev-debuginfo-0:239-45.el8.x86_64", relates_to_product_reference: "BaseOS-8.4.0.GA", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Jann Horn", ], organization: "Google Project Zero", }, ], cve: "CVE-2019-3842", cwe: { id: "CWE-863", name: "Incorrect Authorization", }, discovery_date: "2019-01-23T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1668521", }, ], notes: [ { category: "description", text: "It was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", title: "Vulnerability description", }, { category: "summary", text: "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\"", title: "Vulnerability summary", }, { category: "other", text: "For the attack to be successful, a new session must be created by pam_systemd. This is done only if the calling process is not already part of a session. Red Hat Enterprise Linux, in its default PAM configurations, does not let a session sneak in without systemd knowing about it, since pam_systemd is always called in every PAM config file. Unless a wrong PAM config file is in place, this vulnerability cannot be triggered on Red Hat Enterprise Linux 7 and 8.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3842", }, { category: "external", summary: "RHBZ#1668521", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1668521", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3842", url: "https://www.cve.org/CVERecord?id=CVE-2019-3842", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3842", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3842", }, ], release_date: "2019-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-05-18T15:28:44+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], restart_required: { category: "machine", }, url: "https://access.redhat.com/errata/RHSA-2021:1611", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\"", }, { cve: "CVE-2020-13776", cwe: { id: "CWE-440", name: "Expected Behavior Violation", }, discovery_date: "2020-06-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1845534", }, ], notes: [ { category: "description", text: "A flaw was found in systemd, where it mishandles numerical usernames beginning with decimal digits, or \"0x\" followed by hexadecimal digits. When the usernames are used by systemd, for example in service units, an unexpected user may be used instead. In some particular configurations, this flaw allows local attackers to elevate their privileges.", title: "Vulnerability description", }, { category: "summary", text: "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits", title: "Vulnerability summary", }, { category: "other", text: "The flaw is rated as Moderate because several uncommon conditions have to be met to make it exploitable. Numerical usernames with decimal digits or starting with \"0x\" followed by hexadecimal digits must exist on the system. Systemd would need to process those particular usernames (e.g. while using the `User=` directive in a systemd service unit). If the service was supposed to run as a regular user and the binary being executed can be controlled by a local attacker, he could abuse this flaw to unexpectedly execute code as a root when the service is started. If the service was run as a regular user to limit the impact of a possible flaw in the service, this flaw would not provide the intended additional protection.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-13776", }, { category: "external", summary: "RHBZ#1845534", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1845534", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-13776", url: "https://www.cve.org/CVERecord?id=CVE-2020-13776", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-13776", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-13776", }, ], release_date: "2020-05-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-05-18T15:28:44+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], restart_required: { category: "machine", }, url: "https://access.redhat.com/errata/RHSA-2021:1611", }, { category: "workaround", details: "Do not use `User=` directive in services with numerical usernames composed by decimal digits or starting with \"0x\" followed by hexadecimal digits (e.g. 0x[0-9A-Fa-f]+).", product_ids: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src", "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x", "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits", }, ], }
rhsa-2021_3900
Vulnerability from csaf_redhat
Notes
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "An update for systemd is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", title: "Topic", }, { category: "general", text: "The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.\n\nSecurity Fix(es):\n\n* systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\" (CVE-2019-3842)\n\n* systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits (CVE-2020-13776)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2021:3900", url: "https://access.redhat.com/errata/RHSA-2021:3900", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#moderate", url: "https://access.redhat.com/security/updates/classification/#moderate", }, { category: "external", summary: "1668521", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1668521", }, { category: "external", summary: "1845534", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1845534", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3900.json", }, ], title: "Red Hat Security Advisory: systemd security update", tracking: { current_release_date: "2024-11-22T15:56:28+00:00", generator: { date: "2024-11-22T15:56:28+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2021:3900", initial_release_date: "2021-10-19T07:18:34+00:00", revision_history: [ { date: "2021-10-19T07:18:34+00:00", number: "1", summary: "Initial version", }, { date: "2021-10-19T07:18:34+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-22T15:56:28+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product: { name: "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS", product_identification_helper: { cpe: "cpe:/o:redhat:rhel_eus:8.2::baseos", }, }, }, ], category: "product_family", name: "Red Hat Enterprise Linux", }, { branches: [ { category: "product_version", name: "systemd-0:239-31.el8_2.7.src", product: { name: "systemd-0:239-31.el8_2.7.src", product_id: "systemd-0:239-31.el8_2.7.src", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=src", }, }, }, ], category: "architecture", name: "src", }, { branches: [ { category: "product_version", name: "systemd-0:239-31.el8_2.7.aarch64", product: { name: "systemd-0:239-31.el8_2.7.aarch64", product_id: "systemd-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-container-0:239-31.el8_2.7.aarch64", product: { name: "systemd-container-0:239-31.el8_2.7.aarch64", product_id: "systemd-container-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-devel-0:239-31.el8_2.7.aarch64", product: { name: "systemd-devel-0:239-31.el8_2.7.aarch64", product_id: "systemd-devel-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-31.el8_2.7.aarch64", product: { name: "systemd-journal-remote-0:239-31.el8_2.7.aarch64", product_id: "systemd-journal-remote-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-libs-0:239-31.el8_2.7.aarch64", product: { name: "systemd-libs-0:239-31.el8_2.7.aarch64", product_id: "systemd-libs-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-pam-0:239-31.el8_2.7.aarch64", product: { name: "systemd-pam-0:239-31.el8_2.7.aarch64", product_id: "systemd-pam-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-tests-0:239-31.el8_2.7.aarch64", product: { name: "systemd-tests-0:239-31.el8_2.7.aarch64", product_id: "systemd-tests-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-udev-0:239-31.el8_2.7.aarch64", product: { name: "systemd-udev-0:239-31.el8_2.7.aarch64", product_id: "systemd-udev-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-31.el8_2.7.aarch64", product: { name: "systemd-debugsource-0:239-31.el8_2.7.aarch64", product_id: "systemd-debugsource-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", product: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", product_id: "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=aarch64", }, }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "systemd-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-0:239-31.el8_2.7.ppc64le", product_id: "systemd-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-container-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-container-0:239-31.el8_2.7.ppc64le", product_id: "systemd-container-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-devel-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-devel-0:239-31.el8_2.7.ppc64le", product_id: "systemd-devel-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-journal-remote-0:239-31.el8_2.7.ppc64le", product_id: "systemd-journal-remote-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-libs-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-libs-0:239-31.el8_2.7.ppc64le", product_id: "systemd-libs-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-pam-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-pam-0:239-31.el8_2.7.ppc64le", product_id: "systemd-pam-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-tests-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-tests-0:239-31.el8_2.7.ppc64le", product_id: "systemd-tests-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-udev-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-udev-0:239-31.el8_2.7.ppc64le", product_id: "systemd-udev-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-debugsource-0:239-31.el8_2.7.ppc64le", product_id: "systemd-debugsource-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", product: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", product_id: "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=ppc64le", }, }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "systemd-0:239-31.el8_2.7.i686", product: { name: "systemd-0:239-31.el8_2.7.i686", product_id: "systemd-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-container-0:239-31.el8_2.7.i686", product: { name: "systemd-container-0:239-31.el8_2.7.i686", product_id: "systemd-container-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-devel-0:239-31.el8_2.7.i686", product: { name: "systemd-devel-0:239-31.el8_2.7.i686", product_id: "systemd-devel-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-libs-0:239-31.el8_2.7.i686", product: { name: "systemd-libs-0:239-31.el8_2.7.i686", product_id: "systemd-libs-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-31.el8_2.7.i686", product: { name: "systemd-debugsource-0:239-31.el8_2.7.i686", product_id: "systemd-debugsource-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-container-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-libs-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-pam-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-tests-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-31.el8_2.7.i686", product: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.i686", product_id: "systemd-udev-debuginfo-0:239-31.el8_2.7.i686", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=i686", }, }, }, ], category: "architecture", name: "i686", }, { branches: [ { category: "product_version", name: "systemd-0:239-31.el8_2.7.x86_64", product: { name: "systemd-0:239-31.el8_2.7.x86_64", product_id: "systemd-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-container-0:239-31.el8_2.7.x86_64", product: { name: "systemd-container-0:239-31.el8_2.7.x86_64", product_id: "systemd-container-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-devel-0:239-31.el8_2.7.x86_64", product: { name: "systemd-devel-0:239-31.el8_2.7.x86_64", product_id: "systemd-devel-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-31.el8_2.7.x86_64", product: { name: "systemd-journal-remote-0:239-31.el8_2.7.x86_64", product_id: "systemd-journal-remote-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-libs-0:239-31.el8_2.7.x86_64", product: { name: "systemd-libs-0:239-31.el8_2.7.x86_64", product_id: "systemd-libs-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-pam-0:239-31.el8_2.7.x86_64", product: { name: "systemd-pam-0:239-31.el8_2.7.x86_64", product_id: "systemd-pam-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-tests-0:239-31.el8_2.7.x86_64", product: { name: "systemd-tests-0:239-31.el8_2.7.x86_64", product_id: "systemd-tests-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-udev-0:239-31.el8_2.7.x86_64", product: { name: "systemd-udev-0:239-31.el8_2.7.x86_64", product_id: "systemd-udev-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-31.el8_2.7.x86_64", product: { name: "systemd-debugsource-0:239-31.el8_2.7.x86_64", product_id: "systemd-debugsource-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", product: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", product_id: "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=x86_64", }, }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_version", name: "systemd-0:239-31.el8_2.7.s390x", product: { name: "systemd-0:239-31.el8_2.7.s390x", product_id: "systemd-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-container-0:239-31.el8_2.7.s390x", product: { name: "systemd-container-0:239-31.el8_2.7.s390x", product_id: "systemd-container-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-devel-0:239-31.el8_2.7.s390x", product: { name: "systemd-devel-0:239-31.el8_2.7.s390x", product_id: "systemd-devel-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-journal-remote-0:239-31.el8_2.7.s390x", product: { name: "systemd-journal-remote-0:239-31.el8_2.7.s390x", product_id: "systemd-journal-remote-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-libs-0:239-31.el8_2.7.s390x", product: { name: "systemd-libs-0:239-31.el8_2.7.s390x", product_id: "systemd-libs-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-pam-0:239-31.el8_2.7.s390x", product: { name: "systemd-pam-0:239-31.el8_2.7.s390x", product_id: "systemd-pam-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-tests-0:239-31.el8_2.7.s390x", product: { name: "systemd-tests-0:239-31.el8_2.7.s390x", product_id: "systemd-tests-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-udev-0:239-31.el8_2.7.s390x", product: { name: "systemd-udev-0:239-31.el8_2.7.s390x", product_id: "systemd-udev-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-debugsource-0:239-31.el8_2.7.s390x", product: { name: "systemd-debugsource-0:239-31.el8_2.7.s390x", product_id: "systemd-debugsource-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-container-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-container-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, { category: "product_version", name: "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", product: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", product_id: "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", product_identification_helper: { purl: "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=s390x", }, }, }, ], category: "architecture", name: "s390x", }, ], category: "vendor", name: "Red Hat", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "systemd-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", }, product_reference: "systemd-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-31.el8_2.7.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", }, product_reference: "systemd-0:239-31.el8_2.7.src", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-container-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", }, product_reference: "systemd-container-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-container-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-container-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-container-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-container-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-container-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-debugsource-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", }, product_reference: "systemd-debugsource-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-debugsource-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-debugsource-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-debugsource-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-debugsource-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-devel-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", }, product_reference: "systemd-devel-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-devel-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-devel-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-devel-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-journal-remote-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-journal-remote-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-journal-remote-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-journal-remote-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-libs-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", }, product_reference: "systemd-libs-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-libs-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-libs-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-libs-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-libs-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-pam-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-pam-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-pam-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-pam-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-pam-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-tests-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-tests-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-tests-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-tests-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-tests-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-udev-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-udev-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-udev-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-udev-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", }, product_reference: "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", }, product_reference: "systemd-udev-debuginfo-0:239-31.el8_2.7.i686", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", }, product_reference: "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", }, product_reference: "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, { category: "default_component_of", full_product_name: { name: "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)", product_id: "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", }, product_reference: "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", relates_to_product_reference: "BaseOS-8.2.0.Z.EUS", }, ], }, vulnerabilities: [ { acknowledgments: [ { names: [ "Jann Horn", ], organization: "Google Project Zero", }, ], cve: "CVE-2019-3842", cwe: { id: "CWE-863", name: "Incorrect Authorization", }, discovery_date: "2019-01-23T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1668521", }, ], notes: [ { category: "description", text: "It was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", title: "Vulnerability description", }, { category: "summary", text: "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\"", title: "Vulnerability summary", }, { category: "other", text: "For the attack to be successful, a new session must be created by pam_systemd. This is done only if the calling process is not already part of a session. Red Hat Enterprise Linux, in its default PAM configurations, does not let a session sneak in without systemd knowing about it, since pam_systemd is always called in every PAM config file. Unless a wrong PAM config file is in place, this vulnerability cannot be triggered on Red Hat Enterprise Linux 7 and 8.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2019-3842", }, { category: "external", summary: "RHBZ#1668521", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1668521", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2019-3842", url: "https://www.cve.org/CVERecord?id=CVE-2019-3842", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2019-3842", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3842", }, ], release_date: "2019-04-08T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-10-19T07:18:34+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], restart_required: { category: "machine", }, url: "https://access.redhat.com/errata/RHSA-2021:3900", }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\"", }, { cve: "CVE-2020-13776", cwe: { id: "CWE-440", name: "Expected Behavior Violation", }, discovery_date: "2020-06-03T00:00:00+00:00", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1845534", }, ], notes: [ { category: "description", text: "A flaw was found in systemd, where it mishandles numerical usernames beginning with decimal digits, or \"0x\" followed by hexadecimal digits. When the usernames are used by systemd, for example in service units, an unexpected user may be used instead. In some particular configurations, this flaw allows local attackers to elevate their privileges.", title: "Vulnerability description", }, { category: "summary", text: "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits", title: "Vulnerability summary", }, { category: "other", text: "The flaw is rated as Moderate because several uncommon conditions have to be met to make it exploitable. Numerical usernames with decimal digits or starting with \"0x\" followed by hexadecimal digits must exist on the system. Systemd would need to process those particular usernames (e.g. while using the `User=` directive in a systemd service unit). If the service was supposed to run as a regular user and the binary being executed can be controlled by a local attacker, he could abuse this flaw to unexpectedly execute code as a root when the service is started. If the service was run as a regular user to limit the impact of a possible flaw in the service, this flaw would not provide the intended additional protection.", title: "Statement", }, { category: "general", text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.", title: "CVSS score applicability", }, ], product_status: { fixed: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2020-13776", }, { category: "external", summary: "RHBZ#1845534", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1845534", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2020-13776", url: "https://www.cve.org/CVERecord?id=CVE-2020-13776", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2020-13776", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-13776", }, ], release_date: "2020-05-31T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2021-10-19T07:18:34+00:00", details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", product_ids: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], restart_required: { category: "machine", }, url: "https://access.redhat.com/errata/RHSA-2021:3900", }, { category: "workaround", details: "Do not use `User=` directive in services with numerical usernames composed by decimal digits or starting with \"0x\" followed by hexadecimal digits (e.g. 0x[0-9A-Fa-f]+).", product_ids: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], }, ], scores: [ { cvss_v3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src", "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x", "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64", ], }, ], threats: [ { category: "impact", details: "Moderate", }, ], title: "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits", }, ], }
ghsa-c23j-qp89-q76c
Vulnerability from github
In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".
{ affected: [], aliases: [ "CVE-2019-3842", ], database_specific: { cwe_ids: [ "CWE-863", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2019-04-09T21:29:00Z", severity: "HIGH", }, details: "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", id: "GHSA-c23j-qp89-q76c", modified: "2022-05-13T01:04:09Z", published: "2022-05-13T01:04:09Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2019-3842", }, { type: "WEB", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842", }, { type: "WEB", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, { type: "WEB", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { type: "WEB", url: "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html", }, { type: "WEB", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC", }, { type: "WEB", url: "https://www.exploit-db.com/exploits/46743", }, { type: "WEB", url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html", }, { type: "WEB", url: "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
suse-su-2019:1364-2
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for systemd", title: "Title of the patch", }, { category: "description", text: "This update for systemd fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-3842: Fixed a privilege escalation in pam_systemd which could be exploited by a local user (bsc#1132348).\n- CVE-2019-6454: Fixed a denial of service via crafted D-Bus message (bsc#1125352).\n- CVE-2019-3843, CVE-2019-3844: Fixed a privilege escalation where services with DynamicUser could gain new privileges or create SUID/SGID binaries (bsc#1133506, bsc#1133509).\n\nNon-security issued fixed:\n\n- logind: fix killing of scopes (bsc#1125604)\n- namespace: make MountFlags=shared work again (bsc#1124122)\n- rules: load drivers only on 'add' events (bsc#1126056)\n- sysctl: Don't pass null directive argument to '%s' (bsc#1121563)\n- systemd-coredump: generate a stack trace of all core dumps and log into the journal (jsc#SLE-5933)\n- udevd: notify when max number value of children is reached only once per batch of events (bsc#1132400)\n- sd-bus: bump message queue size again (bsc#1132721)\n- Do not automatically online memory on s390x (bsc#1127557)\n- Removed sg.conf (bsc#1036463)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-1364,SUSE-SLE-Module-Basesystem-15-SP1-2019-1364,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1364", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1364-2.json", }, { category: "self", summary: "URL for SUSE-SU-2019:1364-2", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20191364-2/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:1364-2", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20191364-2.html", }, { category: "self", summary: "SUSE Bug 1036463", url: "https://bugzilla.suse.com/1036463", }, { category: "self", summary: "SUSE Bug 1121563", url: "https://bugzilla.suse.com/1121563", }, { category: "self", summary: "SUSE Bug 1124122", url: "https://bugzilla.suse.com/1124122", }, { category: "self", summary: "SUSE Bug 1125352", url: "https://bugzilla.suse.com/1125352", }, { category: "self", summary: "SUSE Bug 1125604", url: "https://bugzilla.suse.com/1125604", }, { category: "self", summary: "SUSE Bug 1126056", url: "https://bugzilla.suse.com/1126056", }, { category: "self", summary: "SUSE Bug 1127557", url: "https://bugzilla.suse.com/1127557", }, { category: "self", summary: "SUSE Bug 1130230", url: "https://bugzilla.suse.com/1130230", }, { category: "self", summary: "SUSE Bug 1132348", url: "https://bugzilla.suse.com/1132348", }, { category: "self", summary: "SUSE Bug 1132400", url: "https://bugzilla.suse.com/1132400", }, { category: "self", summary: "SUSE Bug 1132721", url: "https://bugzilla.suse.com/1132721", }, { category: "self", summary: "SUSE Bug 1133506", url: "https://bugzilla.suse.com/1133506", }, { category: "self", summary: "SUSE Bug 1133509", url: "https://bugzilla.suse.com/1133509", }, { category: "self", summary: "SUSE CVE CVE-2019-3842 page", url: "https://www.suse.com/security/cve/CVE-2019-3842/", }, { category: "self", summary: "SUSE CVE CVE-2019-3843 page", url: "https://www.suse.com/security/cve/CVE-2019-3843/", }, { category: "self", summary: "SUSE CVE CVE-2019-3844 page", url: "https://www.suse.com/security/cve/CVE-2019-3844/", }, { category: "self", summary: "SUSE CVE CVE-2019-6454 page", url: "https://www.suse.com/security/cve/CVE-2019-6454/", }, { category: "self", summary: "SUSE Bug SLE-5933", url: "https://bugzilla.suse.com/SLE-5933", }, ], title: "Security update for systemd", tracking: { current_release_date: "2019-07-15T13:48:30Z", generator: { date: "2019-07-15T13:48:30Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:1364-2", initial_release_date: "2019-07-15T13:48:30Z", revision_history: [ { date: "2019-07-15T13:48:30Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libsystemd0-234-24.30.1.aarch64", product: { name: "libsystemd0-234-24.30.1.aarch64", product_id: "libsystemd0-234-24.30.1.aarch64", }, }, { category: "product_version", name: "libsystemd0-mini-234-24.30.1.aarch64", product: { name: "libsystemd0-mini-234-24.30.1.aarch64", product_id: "libsystemd0-mini-234-24.30.1.aarch64", }, }, { category: "product_version", name: "libudev-devel-234-24.30.1.aarch64", product: { name: "libudev-devel-234-24.30.1.aarch64", product_id: "libudev-devel-234-24.30.1.aarch64", }, }, { category: "product_version", name: "libudev-mini-devel-234-24.30.1.aarch64", product: { name: "libudev-mini-devel-234-24.30.1.aarch64", product_id: "libudev-mini-devel-234-24.30.1.aarch64", }, }, { category: "product_version", name: "libudev-mini1-234-24.30.1.aarch64", product: { name: "libudev-mini1-234-24.30.1.aarch64", product_id: "libudev-mini1-234-24.30.1.aarch64", }, }, { category: "product_version", name: "libudev1-234-24.30.1.aarch64", product: { name: "libudev1-234-24.30.1.aarch64", product_id: "libudev1-234-24.30.1.aarch64", }, }, { category: "product_version", name: "nss-myhostname-234-24.30.1.aarch64", product: { name: "nss-myhostname-234-24.30.1.aarch64", product_id: "nss-myhostname-234-24.30.1.aarch64", }, }, { category: "product_version", name: "nss-mymachines-234-24.30.1.aarch64", product: { name: "nss-mymachines-234-24.30.1.aarch64", product_id: "nss-mymachines-234-24.30.1.aarch64", }, }, { category: "product_version", name: "nss-systemd-234-24.30.1.aarch64", product: { name: "nss-systemd-234-24.30.1.aarch64", product_id: "nss-systemd-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-234-24.30.1.aarch64", product: { name: "systemd-234-24.30.1.aarch64", product_id: "systemd-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-container-234-24.30.1.aarch64", product: { name: "systemd-container-234-24.30.1.aarch64", product_id: "systemd-container-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-coredump-234-24.30.1.aarch64", product: { name: "systemd-coredump-234-24.30.1.aarch64", product_id: "systemd-coredump-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-devel-234-24.30.1.aarch64", product: { name: "systemd-devel-234-24.30.1.aarch64", product_id: "systemd-devel-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-logger-234-24.30.1.aarch64", product: { name: "systemd-logger-234-24.30.1.aarch64", product_id: "systemd-logger-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-mini-234-24.30.1.aarch64", product: { name: "systemd-mini-234-24.30.1.aarch64", product_id: "systemd-mini-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-mini-container-mini-234-24.30.1.aarch64", product: { name: "systemd-mini-container-mini-234-24.30.1.aarch64", product_id: "systemd-mini-container-mini-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-mini-coredump-mini-234-24.30.1.aarch64", product: { name: "systemd-mini-coredump-mini-234-24.30.1.aarch64", product_id: "systemd-mini-coredump-mini-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-mini-devel-234-24.30.1.aarch64", product: { name: "systemd-mini-devel-234-24.30.1.aarch64", product_id: "systemd-mini-devel-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-mini-sysvinit-234-24.30.1.aarch64", product: { name: "systemd-mini-sysvinit-234-24.30.1.aarch64", product_id: "systemd-mini-sysvinit-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-sysvinit-234-24.30.1.aarch64", product: { name: "systemd-sysvinit-234-24.30.1.aarch64", product_id: "systemd-sysvinit-234-24.30.1.aarch64", }, }, { category: "product_version", name: "udev-234-24.30.1.aarch64", product: { name: "udev-234-24.30.1.aarch64", product_id: "udev-234-24.30.1.aarch64", }, }, { category: "product_version", name: "udev-mini-234-24.30.1.aarch64", product: { name: "udev-mini-234-24.30.1.aarch64", product_id: "udev-mini-234-24.30.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libsystemd0-64bit-234-24.30.1.aarch64_ilp32", product: { name: "libsystemd0-64bit-234-24.30.1.aarch64_ilp32", product_id: "libsystemd0-64bit-234-24.30.1.aarch64_ilp32", }, }, { category: "product_version", name: "libudev-devel-64bit-234-24.30.1.aarch64_ilp32", product: { name: "libudev-devel-64bit-234-24.30.1.aarch64_ilp32", product_id: "libudev-devel-64bit-234-24.30.1.aarch64_ilp32", }, }, { category: "product_version", name: "libudev1-64bit-234-24.30.1.aarch64_ilp32", product: { name: "libudev1-64bit-234-24.30.1.aarch64_ilp32", product_id: "libudev1-64bit-234-24.30.1.aarch64_ilp32", }, }, { category: "product_version", name: "nss-myhostname-64bit-234-24.30.1.aarch64_ilp32", product: { name: "nss-myhostname-64bit-234-24.30.1.aarch64_ilp32", product_id: "nss-myhostname-64bit-234-24.30.1.aarch64_ilp32", }, }, { category: "product_version", name: "nss-mymachines-64bit-234-24.30.1.aarch64_ilp32", product: { name: "nss-mymachines-64bit-234-24.30.1.aarch64_ilp32", product_id: "nss-mymachines-64bit-234-24.30.1.aarch64_ilp32", }, }, { category: "product_version", name: "systemd-64bit-234-24.30.1.aarch64_ilp32", product: { name: "systemd-64bit-234-24.30.1.aarch64_ilp32", product_id: "systemd-64bit-234-24.30.1.aarch64_ilp32", }, }, ], category: "architecture", name: "aarch64_ilp32", }, { branches: [ { category: "product_version", name: "libsystemd0-234-24.30.1.i586", product: { name: "libsystemd0-234-24.30.1.i586", product_id: "libsystemd0-234-24.30.1.i586", }, }, { category: "product_version", name: "libsystemd0-mini-234-24.30.1.i586", product: { name: "libsystemd0-mini-234-24.30.1.i586", product_id: "libsystemd0-mini-234-24.30.1.i586", }, }, { category: "product_version", name: "libudev-devel-234-24.30.1.i586", product: { name: "libudev-devel-234-24.30.1.i586", product_id: "libudev-devel-234-24.30.1.i586", }, }, { category: "product_version", name: "libudev-mini-devel-234-24.30.1.i586", product: { name: "libudev-mini-devel-234-24.30.1.i586", product_id: "libudev-mini-devel-234-24.30.1.i586", }, }, { category: "product_version", name: "libudev-mini1-234-24.30.1.i586", product: { name: "libudev-mini1-234-24.30.1.i586", product_id: "libudev-mini1-234-24.30.1.i586", }, }, { category: "product_version", name: "libudev1-234-24.30.1.i586", product: { name: "libudev1-234-24.30.1.i586", product_id: "libudev1-234-24.30.1.i586", }, }, { category: "product_version", name: "nss-myhostname-234-24.30.1.i586", product: { name: "nss-myhostname-234-24.30.1.i586", product_id: "nss-myhostname-234-24.30.1.i586", }, }, { category: "product_version", name: "nss-mymachines-234-24.30.1.i586", product: { name: "nss-mymachines-234-24.30.1.i586", product_id: "nss-mymachines-234-24.30.1.i586", }, }, { category: "product_version", name: "nss-systemd-234-24.30.1.i586", product: { name: "nss-systemd-234-24.30.1.i586", product_id: "nss-systemd-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-234-24.30.1.i586", product: { name: "systemd-234-24.30.1.i586", product_id: "systemd-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-container-234-24.30.1.i586", product: { name: "systemd-container-234-24.30.1.i586", product_id: "systemd-container-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-coredump-234-24.30.1.i586", product: { name: "systemd-coredump-234-24.30.1.i586", product_id: "systemd-coredump-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-devel-234-24.30.1.i586", product: { name: "systemd-devel-234-24.30.1.i586", product_id: "systemd-devel-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-logger-234-24.30.1.i586", product: { name: "systemd-logger-234-24.30.1.i586", product_id: "systemd-logger-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-mini-234-24.30.1.i586", product: { name: "systemd-mini-234-24.30.1.i586", product_id: "systemd-mini-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-mini-container-mini-234-24.30.1.i586", product: { name: "systemd-mini-container-mini-234-24.30.1.i586", product_id: "systemd-mini-container-mini-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-mini-coredump-mini-234-24.30.1.i586", product: { name: "systemd-mini-coredump-mini-234-24.30.1.i586", product_id: "systemd-mini-coredump-mini-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-mini-devel-234-24.30.1.i586", product: { name: "systemd-mini-devel-234-24.30.1.i586", product_id: "systemd-mini-devel-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-mini-sysvinit-234-24.30.1.i586", product: { name: "systemd-mini-sysvinit-234-24.30.1.i586", product_id: "systemd-mini-sysvinit-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-sysvinit-234-24.30.1.i586", product: { name: "systemd-sysvinit-234-24.30.1.i586", product_id: "systemd-sysvinit-234-24.30.1.i586", }, }, { category: "product_version", name: "udev-234-24.30.1.i586", product: { name: "udev-234-24.30.1.i586", product_id: "udev-234-24.30.1.i586", }, }, { category: "product_version", name: "udev-mini-234-24.30.1.i586", product: { name: "udev-mini-234-24.30.1.i586", product_id: "udev-mini-234-24.30.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "systemd-bash-completion-234-24.30.1.noarch", product: { name: "systemd-bash-completion-234-24.30.1.noarch", product_id: "systemd-bash-completion-234-24.30.1.noarch", }, }, { category: "product_version", name: "systemd-mini-bash-completion-234-24.30.1.noarch", product: { name: "systemd-mini-bash-completion-234-24.30.1.noarch", product_id: "systemd-mini-bash-completion-234-24.30.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "libsystemd0-234-24.30.1.ppc64le", product: { name: "libsystemd0-234-24.30.1.ppc64le", product_id: "libsystemd0-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "libsystemd0-mini-234-24.30.1.ppc64le", product: { name: "libsystemd0-mini-234-24.30.1.ppc64le", product_id: "libsystemd0-mini-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "libudev-devel-234-24.30.1.ppc64le", product: { name: "libudev-devel-234-24.30.1.ppc64le", product_id: "libudev-devel-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "libudev-mini-devel-234-24.30.1.ppc64le", product: { name: "libudev-mini-devel-234-24.30.1.ppc64le", product_id: "libudev-mini-devel-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "libudev-mini1-234-24.30.1.ppc64le", product: { name: "libudev-mini1-234-24.30.1.ppc64le", product_id: "libudev-mini1-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "libudev1-234-24.30.1.ppc64le", product: { name: "libudev1-234-24.30.1.ppc64le", product_id: "libudev1-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "nss-myhostname-234-24.30.1.ppc64le", product: { name: "nss-myhostname-234-24.30.1.ppc64le", product_id: "nss-myhostname-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "nss-mymachines-234-24.30.1.ppc64le", product: { name: "nss-mymachines-234-24.30.1.ppc64le", product_id: "nss-mymachines-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "nss-systemd-234-24.30.1.ppc64le", product: { name: "nss-systemd-234-24.30.1.ppc64le", product_id: "nss-systemd-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-234-24.30.1.ppc64le", product: { name: "systemd-234-24.30.1.ppc64le", product_id: "systemd-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-container-234-24.30.1.ppc64le", product: { name: "systemd-container-234-24.30.1.ppc64le", product_id: "systemd-container-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-coredump-234-24.30.1.ppc64le", product: { name: "systemd-coredump-234-24.30.1.ppc64le", product_id: "systemd-coredump-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-devel-234-24.30.1.ppc64le", product: { name: "systemd-devel-234-24.30.1.ppc64le", product_id: "systemd-devel-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-logger-234-24.30.1.ppc64le", product: { name: "systemd-logger-234-24.30.1.ppc64le", product_id: "systemd-logger-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-mini-234-24.30.1.ppc64le", product: { name: "systemd-mini-234-24.30.1.ppc64le", product_id: "systemd-mini-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-mini-container-mini-234-24.30.1.ppc64le", product: { name: "systemd-mini-container-mini-234-24.30.1.ppc64le", product_id: "systemd-mini-container-mini-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-mini-coredump-mini-234-24.30.1.ppc64le", product: { name: "systemd-mini-coredump-mini-234-24.30.1.ppc64le", product_id: "systemd-mini-coredump-mini-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-mini-devel-234-24.30.1.ppc64le", product: { name: "systemd-mini-devel-234-24.30.1.ppc64le", product_id: "systemd-mini-devel-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-mini-sysvinit-234-24.30.1.ppc64le", product: { name: "systemd-mini-sysvinit-234-24.30.1.ppc64le", product_id: "systemd-mini-sysvinit-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-sysvinit-234-24.30.1.ppc64le", product: { name: "systemd-sysvinit-234-24.30.1.ppc64le", product_id: "systemd-sysvinit-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "udev-234-24.30.1.ppc64le", product: { name: "udev-234-24.30.1.ppc64le", product_id: "udev-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "udev-mini-234-24.30.1.ppc64le", product: { name: "udev-mini-234-24.30.1.ppc64le", product_id: "udev-mini-234-24.30.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libsystemd0-234-24.30.1.s390x", product: { name: "libsystemd0-234-24.30.1.s390x", product_id: "libsystemd0-234-24.30.1.s390x", }, }, { category: "product_version", name: "libsystemd0-mini-234-24.30.1.s390x", product: { name: "libsystemd0-mini-234-24.30.1.s390x", product_id: "libsystemd0-mini-234-24.30.1.s390x", }, }, { category: "product_version", name: "libudev-devel-234-24.30.1.s390x", product: { name: "libudev-devel-234-24.30.1.s390x", product_id: "libudev-devel-234-24.30.1.s390x", }, }, { category: "product_version", name: "libudev-mini-devel-234-24.30.1.s390x", product: { name: "libudev-mini-devel-234-24.30.1.s390x", product_id: "libudev-mini-devel-234-24.30.1.s390x", }, }, { category: "product_version", name: "libudev-mini1-234-24.30.1.s390x", product: { name: "libudev-mini1-234-24.30.1.s390x", product_id: "libudev-mini1-234-24.30.1.s390x", }, }, { category: "product_version", name: "libudev1-234-24.30.1.s390x", product: { name: "libudev1-234-24.30.1.s390x", product_id: "libudev1-234-24.30.1.s390x", }, }, { category: "product_version", name: "nss-myhostname-234-24.30.1.s390x", product: { name: "nss-myhostname-234-24.30.1.s390x", product_id: "nss-myhostname-234-24.30.1.s390x", }, }, { category: "product_version", name: "nss-mymachines-234-24.30.1.s390x", product: { name: "nss-mymachines-234-24.30.1.s390x", product_id: "nss-mymachines-234-24.30.1.s390x", }, }, { category: "product_version", name: "nss-systemd-234-24.30.1.s390x", product: { name: "nss-systemd-234-24.30.1.s390x", product_id: "nss-systemd-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-234-24.30.1.s390x", product: { name: "systemd-234-24.30.1.s390x", product_id: "systemd-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-container-234-24.30.1.s390x", product: { name: "systemd-container-234-24.30.1.s390x", product_id: "systemd-container-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-coredump-234-24.30.1.s390x", product: { name: "systemd-coredump-234-24.30.1.s390x", product_id: "systemd-coredump-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-devel-234-24.30.1.s390x", product: { name: "systemd-devel-234-24.30.1.s390x", product_id: "systemd-devel-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-logger-234-24.30.1.s390x", product: { name: "systemd-logger-234-24.30.1.s390x", product_id: "systemd-logger-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-mini-234-24.30.1.s390x", product: { name: "systemd-mini-234-24.30.1.s390x", product_id: "systemd-mini-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-mini-container-mini-234-24.30.1.s390x", product: { name: "systemd-mini-container-mini-234-24.30.1.s390x", product_id: "systemd-mini-container-mini-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-mini-coredump-mini-234-24.30.1.s390x", product: { name: "systemd-mini-coredump-mini-234-24.30.1.s390x", product_id: "systemd-mini-coredump-mini-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-mini-devel-234-24.30.1.s390x", product: { name: "systemd-mini-devel-234-24.30.1.s390x", product_id: "systemd-mini-devel-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-mini-sysvinit-234-24.30.1.s390x", product: { name: "systemd-mini-sysvinit-234-24.30.1.s390x", product_id: "systemd-mini-sysvinit-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-sysvinit-234-24.30.1.s390x", product: { name: "systemd-sysvinit-234-24.30.1.s390x", product_id: "systemd-sysvinit-234-24.30.1.s390x", }, }, { category: "product_version", name: "udev-234-24.30.1.s390x", product: { name: "udev-234-24.30.1.s390x", product_id: "udev-234-24.30.1.s390x", }, }, { category: "product_version", name: "udev-mini-234-24.30.1.s390x", product: { name: "udev-mini-234-24.30.1.s390x", product_id: "udev-mini-234-24.30.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libsystemd0-234-24.30.1.x86_64", product: { name: "libsystemd0-234-24.30.1.x86_64", product_id: "libsystemd0-234-24.30.1.x86_64", }, }, { category: "product_version", name: "libsystemd0-32bit-234-24.30.1.x86_64", product: { name: "libsystemd0-32bit-234-24.30.1.x86_64", product_id: "libsystemd0-32bit-234-24.30.1.x86_64", }, }, { category: "product_version", name: "libsystemd0-mini-234-24.30.1.x86_64", product: { name: "libsystemd0-mini-234-24.30.1.x86_64", product_id: "libsystemd0-mini-234-24.30.1.x86_64", }, }, { category: "product_version", name: "libudev-devel-234-24.30.1.x86_64", product: { name: "libudev-devel-234-24.30.1.x86_64", product_id: "libudev-devel-234-24.30.1.x86_64", }, }, { category: "product_version", name: "libudev-devel-32bit-234-24.30.1.x86_64", product: { name: "libudev-devel-32bit-234-24.30.1.x86_64", product_id: "libudev-devel-32bit-234-24.30.1.x86_64", }, }, { category: "product_version", name: "libudev-mini-devel-234-24.30.1.x86_64", product: { name: "libudev-mini-devel-234-24.30.1.x86_64", product_id: "libudev-mini-devel-234-24.30.1.x86_64", }, }, { category: "product_version", name: "libudev-mini1-234-24.30.1.x86_64", product: { name: "libudev-mini1-234-24.30.1.x86_64", product_id: "libudev-mini1-234-24.30.1.x86_64", }, }, { category: "product_version", name: "libudev1-234-24.30.1.x86_64", product: { name: "libudev1-234-24.30.1.x86_64", product_id: "libudev1-234-24.30.1.x86_64", }, }, { category: "product_version", name: "libudev1-32bit-234-24.30.1.x86_64", product: { name: "libudev1-32bit-234-24.30.1.x86_64", product_id: "libudev1-32bit-234-24.30.1.x86_64", }, }, { category: "product_version", name: "nss-myhostname-234-24.30.1.x86_64", product: { name: "nss-myhostname-234-24.30.1.x86_64", product_id: "nss-myhostname-234-24.30.1.x86_64", }, }, { category: "product_version", name: "nss-myhostname-32bit-234-24.30.1.x86_64", product: { name: "nss-myhostname-32bit-234-24.30.1.x86_64", product_id: "nss-myhostname-32bit-234-24.30.1.x86_64", }, }, { category: "product_version", name: "nss-mymachines-234-24.30.1.x86_64", product: { name: "nss-mymachines-234-24.30.1.x86_64", product_id: "nss-mymachines-234-24.30.1.x86_64", }, }, { category: "product_version", name: "nss-mymachines-32bit-234-24.30.1.x86_64", product: { name: "nss-mymachines-32bit-234-24.30.1.x86_64", product_id: "nss-mymachines-32bit-234-24.30.1.x86_64", }, }, { category: "product_version", name: "nss-systemd-234-24.30.1.x86_64", product: { name: "nss-systemd-234-24.30.1.x86_64", product_id: "nss-systemd-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-234-24.30.1.x86_64", product: { name: "systemd-234-24.30.1.x86_64", product_id: "systemd-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-32bit-234-24.30.1.x86_64", product: { name: "systemd-32bit-234-24.30.1.x86_64", product_id: "systemd-32bit-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-container-234-24.30.1.x86_64", product: { name: "systemd-container-234-24.30.1.x86_64", product_id: "systemd-container-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-coredump-234-24.30.1.x86_64", product: { name: "systemd-coredump-234-24.30.1.x86_64", product_id: "systemd-coredump-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-devel-234-24.30.1.x86_64", product: { name: "systemd-devel-234-24.30.1.x86_64", product_id: "systemd-devel-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-logger-234-24.30.1.x86_64", product: { name: "systemd-logger-234-24.30.1.x86_64", product_id: "systemd-logger-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-mini-234-24.30.1.x86_64", product: { name: "systemd-mini-234-24.30.1.x86_64", product_id: "systemd-mini-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-mini-container-mini-234-24.30.1.x86_64", product: { name: "systemd-mini-container-mini-234-24.30.1.x86_64", product_id: "systemd-mini-container-mini-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-mini-coredump-mini-234-24.30.1.x86_64", product: { name: "systemd-mini-coredump-mini-234-24.30.1.x86_64", product_id: "systemd-mini-coredump-mini-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-mini-devel-234-24.30.1.x86_64", product: { name: "systemd-mini-devel-234-24.30.1.x86_64", product_id: "systemd-mini-devel-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-mini-sysvinit-234-24.30.1.x86_64", product: { name: "systemd-mini-sysvinit-234-24.30.1.x86_64", product_id: "systemd-mini-sysvinit-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-sysvinit-234-24.30.1.x86_64", product: { name: "systemd-sysvinit-234-24.30.1.x86_64", product_id: "systemd-sysvinit-234-24.30.1.x86_64", }, }, { category: "product_version", name: "udev-234-24.30.1.x86_64", product: { name: "udev-234-24.30.1.x86_64", product_id: "udev-234-24.30.1.x86_64", }, }, { category: "product_version", name: "udev-mini-234-24.30.1.x86_64", product: { name: "udev-mini-234-24.30.1.x86_64", product_id: "udev-mini-234-24.30.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libsystemd0-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64", }, product_reference: "libsystemd0-234-24.30.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le", }, product_reference: "libsystemd0-234-24.30.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x", }, product_reference: "libsystemd0-234-24.30.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64", }, product_reference: "libsystemd0-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64", }, product_reference: "libsystemd0-32bit-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64", }, product_reference: "libudev-devel-234-24.30.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le", }, product_reference: "libudev-devel-234-24.30.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x", }, product_reference: "libudev-devel-234-24.30.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64", }, product_reference: "libudev-devel-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libudev1-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64", }, product_reference: "libudev1-234-24.30.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libudev1-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le", }, product_reference: "libudev1-234-24.30.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libudev1-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x", }, product_reference: "libudev1-234-24.30.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libudev1-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64", }, product_reference: "libudev1-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64", }, product_reference: "libudev1-32bit-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64", }, product_reference: "systemd-234-24.30.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le", }, product_reference: "systemd-234-24.30.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x", }, product_reference: "systemd-234-24.30.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64", }, product_reference: "systemd-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64", }, product_reference: "systemd-32bit-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-bash-completion-234-24.30.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch", }, product_reference: "systemd-bash-completion-234-24.30.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-container-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64", }, product_reference: "systemd-container-234-24.30.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-container-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le", }, product_reference: "systemd-container-234-24.30.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-container-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x", }, product_reference: "systemd-container-234-24.30.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-container-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64", }, product_reference: "systemd-container-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-coredump-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64", }, product_reference: "systemd-coredump-234-24.30.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-coredump-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le", }, product_reference: "systemd-coredump-234-24.30.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-coredump-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x", }, product_reference: "systemd-coredump-234-24.30.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-coredump-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64", }, product_reference: "systemd-coredump-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64", }, product_reference: "systemd-devel-234-24.30.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le", }, product_reference: "systemd-devel-234-24.30.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x", }, product_reference: "systemd-devel-234-24.30.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64", }, product_reference: "systemd-devel-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64", }, product_reference: "systemd-sysvinit-234-24.30.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le", }, product_reference: "systemd-sysvinit-234-24.30.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x", }, product_reference: "systemd-sysvinit-234-24.30.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64", }, product_reference: "systemd-sysvinit-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "udev-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64", }, product_reference: "udev-234-24.30.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "udev-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le", }, product_reference: "udev-234-24.30.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "udev-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x", }, product_reference: "udev-234-24.30.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "udev-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64", }, product_reference: "udev-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2019-3842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3842", }, ], notes: [ { category: "general", text: "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3842", url: "https://www.suse.com/security/cve/CVE-2019-3842", }, { category: "external", summary: "SUSE Bug 1132348 for CVE-2019-3842", url: "https://bugzilla.suse.com/1132348", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-07-15T13:48:30Z", details: "moderate", }, ], title: "CVE-2019-3842", }, { cve: "CVE-2019-3843", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3843", }, ], notes: [ { category: "general", text: "It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3843", url: "https://www.suse.com/security/cve/CVE-2019-3843", }, { category: "external", summary: "SUSE Bug 1133506 for CVE-2019-3843", url: "https://bugzilla.suse.com/1133506", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-07-15T13:48:30Z", details: "moderate", }, ], title: "CVE-2019-3843", }, { cve: "CVE-2019-3844", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3844", }, ], notes: [ { category: "general", text: "It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3844", url: "https://www.suse.com/security/cve/CVE-2019-3844", }, { category: "external", summary: "SUSE Bug 1133509 for CVE-2019-3844", url: "https://bugzilla.suse.com/1133509", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-07-15T13:48:30Z", details: "moderate", }, ], title: "CVE-2019-3844", }, { cve: "CVE-2019-6454", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-6454", }, ], notes: [ { category: "general", text: "An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-6454", url: "https://www.suse.com/security/cve/CVE-2019-6454", }, { category: "external", summary: "SUSE Bug 1125352 for CVE-2019-6454", url: "https://bugzilla.suse.com/1125352", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-07-15T13:48:30Z", details: "important", }, ], title: "CVE-2019-6454", }, ], }
suse-su-2019:1265-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for systemd", title: "Title of the patch", }, { category: "description", text: "This update for systemd fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-6954: Fixed a vulnerability in the symlink handling of systemd-tmpfiles \n which allowed a local user to obtain ownership of arbitrary files (bsc#1080919).\n- CVE-2019-3842: Fixed a vulnerability in pam_systemd which allowed a local user to escalate privileges (bsc#1132348).\n- CVE-2019-6454: Fixed a denial of service caused by long dbus messages (bsc#1125352).\n\nNon-security issues fixed:\n\n- systemd-coredump: generate a stack trace of all core dumps (jsc#SLE-5933)\n- udevd: notify when max number value of children is reached only once per batch of events (bsc#1132400)\n- sd-bus: bump message queue size again (bsc#1132721)\n- core: only watch processes when it's really necessary (bsc#955942 bsc#1128657)\n- rules: load drivers only on 'add' events (bsc#1126056)\n- sysctl: Don't pass null directive argument to '%s' (bsc#1121563)\n- Do not automatically online memory on s390x (bsc#1127557)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-1265,SUSE-OpenStack-Cloud-7-2019-1265,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1265,SUSE-SLE-DESKTOP-12-SP3-2019-1265,SUSE-SLE-DESKTOP-12-SP4-2019-1265,SUSE-SLE-SAP-12-SP2-2019-1265,SUSE-SLE-SDK-12-SP3-2019-1265,SUSE-SLE-SDK-12-SP4-2019-1265,SUSE-SLE-SERVER-12-SP2-2019-1265,SUSE-SLE-SERVER-12-SP2-BCL-2019-1265,SUSE-SLE-SERVER-12-SP3-2019-1265,SUSE-SLE-SERVER-12-SP4-2019-1265,SUSE-Storage-4-2019-1265", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1265-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:1265-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20191265-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:1265-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-May/005467.html", }, { category: "self", summary: "SUSE Bug 1080919", url: "https://bugzilla.suse.com/1080919", }, { category: "self", summary: "SUSE Bug 1121563", url: "https://bugzilla.suse.com/1121563", }, { category: "self", summary: "SUSE Bug 1125352", url: "https://bugzilla.suse.com/1125352", }, { category: "self", summary: "SUSE Bug 1126056", url: "https://bugzilla.suse.com/1126056", }, { category: "self", summary: "SUSE Bug 1127557", url: "https://bugzilla.suse.com/1127557", }, { category: "self", summary: "SUSE Bug 1128657", url: "https://bugzilla.suse.com/1128657", }, { category: "self", summary: "SUSE Bug 1130230", url: "https://bugzilla.suse.com/1130230", }, { category: "self", summary: "SUSE Bug 1132348", url: "https://bugzilla.suse.com/1132348", }, { category: "self", summary: "SUSE Bug 1132400", url: "https://bugzilla.suse.com/1132400", }, { category: "self", summary: "SUSE Bug 1132721", url: "https://bugzilla.suse.com/1132721", }, { category: "self", summary: "SUSE Bug 955942", url: "https://bugzilla.suse.com/955942", }, { category: "self", summary: "SUSE CVE CVE-2018-6954 page", url: "https://www.suse.com/security/cve/CVE-2018-6954/", }, { category: "self", summary: "SUSE CVE CVE-2019-3842 page", url: "https://www.suse.com/security/cve/CVE-2019-3842/", }, { category: "self", summary: "SUSE CVE CVE-2019-6454 page", url: "https://www.suse.com/security/cve/CVE-2019-6454/", }, { category: "self", summary: "SUSE Bug SLE-5933", url: "https://bugzilla.suse.com/SLE-5933", }, ], title: "Security update for systemd", tracking: { current_release_date: "2019-05-16T07:53:09Z", generator: { date: "2019-05-16T07:53:09Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:1265-1", initial_release_date: "2019-05-16T07:53:09Z", revision_history: [ { date: "2019-05-16T07:53:09Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libsystemd0-228-150.66.4.aarch64", product: { name: "libsystemd0-228-150.66.4.aarch64", product_id: "libsystemd0-228-150.66.4.aarch64", }, }, { category: "product_version", name: "libsystemd0-mini-228-150.66.2.aarch64", product: { name: "libsystemd0-mini-228-150.66.2.aarch64", product_id: "libsystemd0-mini-228-150.66.2.aarch64", }, }, { category: "product_version", name: "libudev-devel-228-150.66.4.aarch64", product: { name: "libudev-devel-228-150.66.4.aarch64", product_id: "libudev-devel-228-150.66.4.aarch64", }, }, { category: "product_version", name: "libudev-mini-devel-228-150.66.2.aarch64", product: { name: "libudev-mini-devel-228-150.66.2.aarch64", product_id: "libudev-mini-devel-228-150.66.2.aarch64", }, }, { category: "product_version", name: "libudev-mini1-228-150.66.2.aarch64", product: { name: "libudev-mini1-228-150.66.2.aarch64", product_id: "libudev-mini1-228-150.66.2.aarch64", }, }, { category: "product_version", name: "libudev1-228-150.66.4.aarch64", product: { name: "libudev1-228-150.66.4.aarch64", product_id: "libudev1-228-150.66.4.aarch64", }, }, { category: "product_version", name: "nss-myhostname-228-150.66.4.aarch64", product: { name: "nss-myhostname-228-150.66.4.aarch64", product_id: "nss-myhostname-228-150.66.4.aarch64", }, }, { category: "product_version", name: "nss-mymachines-228-150.66.4.aarch64", product: { name: "nss-mymachines-228-150.66.4.aarch64", product_id: "nss-mymachines-228-150.66.4.aarch64", }, }, { category: "product_version", name: "systemd-228-150.66.4.aarch64", product: { name: "systemd-228-150.66.4.aarch64", product_id: "systemd-228-150.66.4.aarch64", }, }, { category: "product_version", name: "systemd-devel-228-150.66.4.aarch64", product: { name: "systemd-devel-228-150.66.4.aarch64", product_id: "systemd-devel-228-150.66.4.aarch64", }, }, { category: "product_version", name: "systemd-logger-228-150.66.4.aarch64", product: { name: "systemd-logger-228-150.66.4.aarch64", product_id: "systemd-logger-228-150.66.4.aarch64", }, }, { category: "product_version", name: "systemd-mini-228-150.66.2.aarch64", product: { name: "systemd-mini-228-150.66.2.aarch64", product_id: "systemd-mini-228-150.66.2.aarch64", }, }, { category: "product_version", name: "systemd-mini-devel-228-150.66.2.aarch64", product: { name: "systemd-mini-devel-228-150.66.2.aarch64", product_id: "systemd-mini-devel-228-150.66.2.aarch64", }, }, { category: "product_version", name: "systemd-mini-sysvinit-228-150.66.2.aarch64", product: { name: "systemd-mini-sysvinit-228-150.66.2.aarch64", product_id: "systemd-mini-sysvinit-228-150.66.2.aarch64", }, }, { category: "product_version", name: "systemd-sysvinit-228-150.66.4.aarch64", product: { name: "systemd-sysvinit-228-150.66.4.aarch64", product_id: "systemd-sysvinit-228-150.66.4.aarch64", }, }, { category: "product_version", name: "udev-228-150.66.4.aarch64", product: { name: "udev-228-150.66.4.aarch64", product_id: "udev-228-150.66.4.aarch64", }, }, { category: "product_version", name: "udev-mini-228-150.66.2.aarch64", product: { name: "udev-mini-228-150.66.2.aarch64", product_id: "udev-mini-228-150.66.2.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libsystemd0-64bit-228-150.66.4.aarch64_ilp32", product: { name: "libsystemd0-64bit-228-150.66.4.aarch64_ilp32", product_id: "libsystemd0-64bit-228-150.66.4.aarch64_ilp32", }, }, { category: "product_version", name: "libudev1-64bit-228-150.66.4.aarch64_ilp32", product: { name: "libudev1-64bit-228-150.66.4.aarch64_ilp32", product_id: "libudev1-64bit-228-150.66.4.aarch64_ilp32", }, }, { category: "product_version", name: "nss-myhostname-64bit-228-150.66.4.aarch64_ilp32", product: { name: "nss-myhostname-64bit-228-150.66.4.aarch64_ilp32", product_id: "nss-myhostname-64bit-228-150.66.4.aarch64_ilp32", }, }, { category: "product_version", name: "systemd-64bit-228-150.66.4.aarch64_ilp32", product: { name: "systemd-64bit-228-150.66.4.aarch64_ilp32", product_id: "systemd-64bit-228-150.66.4.aarch64_ilp32", }, }, ], category: "architecture", name: "aarch64_ilp32", }, { branches: [ { category: "product_version", name: "libsystemd0-228-150.66.4.i586", product: { name: "libsystemd0-228-150.66.4.i586", product_id: "libsystemd0-228-150.66.4.i586", }, }, { category: "product_version", name: "libsystemd0-mini-228-150.66.2.i586", product: { name: "libsystemd0-mini-228-150.66.2.i586", product_id: "libsystemd0-mini-228-150.66.2.i586", }, }, { category: "product_version", name: "libudev-devel-228-150.66.4.i586", product: { name: "libudev-devel-228-150.66.4.i586", product_id: "libudev-devel-228-150.66.4.i586", }, }, { category: "product_version", name: "libudev-mini-devel-228-150.66.2.i586", product: { name: "libudev-mini-devel-228-150.66.2.i586", product_id: "libudev-mini-devel-228-150.66.2.i586", }, }, { category: "product_version", name: "libudev-mini1-228-150.66.2.i586", product: { name: "libudev-mini1-228-150.66.2.i586", product_id: "libudev-mini1-228-150.66.2.i586", }, }, { category: "product_version", name: "libudev1-228-150.66.4.i586", product: { name: "libudev1-228-150.66.4.i586", product_id: "libudev1-228-150.66.4.i586", }, }, { category: "product_version", name: "nss-myhostname-228-150.66.4.i586", product: { name: "nss-myhostname-228-150.66.4.i586", product_id: "nss-myhostname-228-150.66.4.i586", }, }, { category: "product_version", name: "nss-mymachines-228-150.66.4.i586", product: { name: "nss-mymachines-228-150.66.4.i586", product_id: "nss-mymachines-228-150.66.4.i586", }, }, { category: "product_version", name: "systemd-228-150.66.4.i586", product: { name: "systemd-228-150.66.4.i586", product_id: "systemd-228-150.66.4.i586", }, }, { category: "product_version", name: "systemd-devel-228-150.66.4.i586", product: { name: "systemd-devel-228-150.66.4.i586", product_id: "systemd-devel-228-150.66.4.i586", }, }, { category: "product_version", name: "systemd-logger-228-150.66.4.i586", product: { name: "systemd-logger-228-150.66.4.i586", product_id: "systemd-logger-228-150.66.4.i586", }, }, { category: "product_version", name: "systemd-mini-228-150.66.2.i586", product: { name: "systemd-mini-228-150.66.2.i586", product_id: "systemd-mini-228-150.66.2.i586", }, }, { category: "product_version", name: "systemd-mini-devel-228-150.66.2.i586", product: { name: "systemd-mini-devel-228-150.66.2.i586", product_id: "systemd-mini-devel-228-150.66.2.i586", }, }, { category: "product_version", name: "systemd-mini-sysvinit-228-150.66.2.i586", product: { name: "systemd-mini-sysvinit-228-150.66.2.i586", product_id: "systemd-mini-sysvinit-228-150.66.2.i586", }, }, { category: "product_version", name: "systemd-sysvinit-228-150.66.4.i586", product: { name: "systemd-sysvinit-228-150.66.4.i586", product_id: "systemd-sysvinit-228-150.66.4.i586", }, }, { category: "product_version", name: "udev-228-150.66.4.i586", product: { name: "udev-228-150.66.4.i586", product_id: "udev-228-150.66.4.i586", }, }, { category: "product_version", name: "udev-mini-228-150.66.2.i586", product: { name: "udev-mini-228-150.66.2.i586", product_id: "udev-mini-228-150.66.2.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "systemd-bash-completion-228-150.66.4.noarch", product: { name: "systemd-bash-completion-228-150.66.4.noarch", product_id: "systemd-bash-completion-228-150.66.4.noarch", }, }, { category: "product_version", name: "systemd-mini-bash-completion-228-150.66.2.noarch", product: { name: "systemd-mini-bash-completion-228-150.66.2.noarch", product_id: "systemd-mini-bash-completion-228-150.66.2.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "libsystemd0-228-150.66.4.ppc64le", product: { name: "libsystemd0-228-150.66.4.ppc64le", product_id: "libsystemd0-228-150.66.4.ppc64le", }, }, { category: "product_version", name: "libsystemd0-mini-228-150.66.2.ppc64le", product: { name: "libsystemd0-mini-228-150.66.2.ppc64le", product_id: "libsystemd0-mini-228-150.66.2.ppc64le", }, }, { category: "product_version", name: "libudev-devel-228-150.66.4.ppc64le", product: { name: "libudev-devel-228-150.66.4.ppc64le", product_id: "libudev-devel-228-150.66.4.ppc64le", }, }, { category: "product_version", name: "libudev-mini-devel-228-150.66.2.ppc64le", product: { name: "libudev-mini-devel-228-150.66.2.ppc64le", product_id: "libudev-mini-devel-228-150.66.2.ppc64le", }, }, { category: "product_version", name: "libudev-mini1-228-150.66.2.ppc64le", product: { name: "libudev-mini1-228-150.66.2.ppc64le", product_id: "libudev-mini1-228-150.66.2.ppc64le", }, }, { category: "product_version", name: "libudev1-228-150.66.4.ppc64le", product: { name: "libudev1-228-150.66.4.ppc64le", product_id: "libudev1-228-150.66.4.ppc64le", }, }, { category: "product_version", name: "nss-myhostname-228-150.66.4.ppc64le", product: { name: "nss-myhostname-228-150.66.4.ppc64le", product_id: "nss-myhostname-228-150.66.4.ppc64le", }, }, { category: "product_version", name: "nss-mymachines-228-150.66.4.ppc64le", product: { name: "nss-mymachines-228-150.66.4.ppc64le", product_id: "nss-mymachines-228-150.66.4.ppc64le", }, }, { category: "product_version", name: "systemd-228-150.66.4.ppc64le", product: { name: "systemd-228-150.66.4.ppc64le", product_id: "systemd-228-150.66.4.ppc64le", }, }, { category: "product_version", name: "systemd-devel-228-150.66.4.ppc64le", product: { name: "systemd-devel-228-150.66.4.ppc64le", product_id: "systemd-devel-228-150.66.4.ppc64le", }, }, { category: "product_version", name: "systemd-logger-228-150.66.4.ppc64le", product: { name: "systemd-logger-228-150.66.4.ppc64le", product_id: "systemd-logger-228-150.66.4.ppc64le", }, }, { category: "product_version", name: "systemd-mini-228-150.66.2.ppc64le", product: { name: "systemd-mini-228-150.66.2.ppc64le", product_id: "systemd-mini-228-150.66.2.ppc64le", }, }, { category: "product_version", name: "systemd-mini-devel-228-150.66.2.ppc64le", product: { name: "systemd-mini-devel-228-150.66.2.ppc64le", product_id: "systemd-mini-devel-228-150.66.2.ppc64le", }, }, { category: "product_version", name: "systemd-mini-sysvinit-228-150.66.2.ppc64le", product: { name: "systemd-mini-sysvinit-228-150.66.2.ppc64le", product_id: "systemd-mini-sysvinit-228-150.66.2.ppc64le", }, }, { category: "product_version", name: "systemd-sysvinit-228-150.66.4.ppc64le", product: { name: "systemd-sysvinit-228-150.66.4.ppc64le", product_id: "systemd-sysvinit-228-150.66.4.ppc64le", }, }, { category: "product_version", name: "udev-228-150.66.4.ppc64le", product: { name: "udev-228-150.66.4.ppc64le", product_id: "udev-228-150.66.4.ppc64le", }, }, { category: "product_version", name: "udev-mini-228-150.66.2.ppc64le", product: { name: "udev-mini-228-150.66.2.ppc64le", product_id: "udev-mini-228-150.66.2.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libsystemd0-228-150.66.4.s390", product: { name: "libsystemd0-228-150.66.4.s390", product_id: "libsystemd0-228-150.66.4.s390", }, }, { category: "product_version", name: "libsystemd0-mini-228-150.66.2.s390", product: { name: "libsystemd0-mini-228-150.66.2.s390", product_id: "libsystemd0-mini-228-150.66.2.s390", }, }, { category: "product_version", name: "libudev-devel-228-150.66.4.s390", product: { name: "libudev-devel-228-150.66.4.s390", product_id: "libudev-devel-228-150.66.4.s390", }, }, { category: "product_version", name: "libudev-mini-devel-228-150.66.2.s390", product: { name: "libudev-mini-devel-228-150.66.2.s390", product_id: "libudev-mini-devel-228-150.66.2.s390", }, }, { category: "product_version", name: "libudev-mini1-228-150.66.2.s390", product: { name: "libudev-mini1-228-150.66.2.s390", product_id: "libudev-mini1-228-150.66.2.s390", }, }, { category: "product_version", name: "libudev1-228-150.66.4.s390", product: { name: "libudev1-228-150.66.4.s390", product_id: "libudev1-228-150.66.4.s390", }, }, { category: "product_version", name: "nss-myhostname-228-150.66.4.s390", product: { name: "nss-myhostname-228-150.66.4.s390", product_id: "nss-myhostname-228-150.66.4.s390", }, }, { category: "product_version", name: "nss-mymachines-228-150.66.4.s390", product: { name: "nss-mymachines-228-150.66.4.s390", product_id: "nss-mymachines-228-150.66.4.s390", }, }, { category: "product_version", name: "systemd-228-150.66.4.s390", product: { name: "systemd-228-150.66.4.s390", product_id: "systemd-228-150.66.4.s390", }, }, { category: "product_version", name: "systemd-devel-228-150.66.4.s390", product: { name: "systemd-devel-228-150.66.4.s390", product_id: "systemd-devel-228-150.66.4.s390", }, }, { category: "product_version", name: "systemd-logger-228-150.66.4.s390", product: { name: "systemd-logger-228-150.66.4.s390", product_id: "systemd-logger-228-150.66.4.s390", }, }, { category: "product_version", name: "systemd-mini-228-150.66.2.s390", product: { name: "systemd-mini-228-150.66.2.s390", product_id: "systemd-mini-228-150.66.2.s390", }, }, { category: "product_version", name: "systemd-mini-devel-228-150.66.2.s390", product: { name: "systemd-mini-devel-228-150.66.2.s390", product_id: "systemd-mini-devel-228-150.66.2.s390", }, }, { category: "product_version", name: "systemd-mini-sysvinit-228-150.66.2.s390", product: { name: "systemd-mini-sysvinit-228-150.66.2.s390", product_id: "systemd-mini-sysvinit-228-150.66.2.s390", }, }, { category: "product_version", name: "systemd-sysvinit-228-150.66.4.s390", product: { name: "systemd-sysvinit-228-150.66.4.s390", product_id: "systemd-sysvinit-228-150.66.4.s390", }, }, { category: "product_version", name: "udev-228-150.66.4.s390", product: { name: "udev-228-150.66.4.s390", product_id: "udev-228-150.66.4.s390", }, }, { category: "product_version", name: "udev-mini-228-150.66.2.s390", product: { name: "udev-mini-228-150.66.2.s390", product_id: "udev-mini-228-150.66.2.s390", }, }, ], category: "architecture", name: "s390", }, { branches: [ { category: "product_version", name: "libsystemd0-228-150.66.4.s390x", product: { name: "libsystemd0-228-150.66.4.s390x", product_id: "libsystemd0-228-150.66.4.s390x", }, }, { category: "product_version", name: "libsystemd0-32bit-228-150.66.4.s390x", product: { name: "libsystemd0-32bit-228-150.66.4.s390x", product_id: "libsystemd0-32bit-228-150.66.4.s390x", }, }, { category: "product_version", name: "libsystemd0-mini-228-150.66.2.s390x", product: { name: "libsystemd0-mini-228-150.66.2.s390x", product_id: "libsystemd0-mini-228-150.66.2.s390x", }, }, { category: "product_version", name: "libudev-devel-228-150.66.4.s390x", product: { name: "libudev-devel-228-150.66.4.s390x", product_id: "libudev-devel-228-150.66.4.s390x", }, }, { category: "product_version", name: "libudev-mini-devel-228-150.66.2.s390x", product: { name: "libudev-mini-devel-228-150.66.2.s390x", product_id: "libudev-mini-devel-228-150.66.2.s390x", }, }, { category: "product_version", name: "libudev-mini1-228-150.66.2.s390x", product: { name: "libudev-mini1-228-150.66.2.s390x", product_id: "libudev-mini1-228-150.66.2.s390x", }, }, { category: "product_version", name: "libudev1-228-150.66.4.s390x", product: { name: "libudev1-228-150.66.4.s390x", product_id: "libudev1-228-150.66.4.s390x", }, }, { category: "product_version", name: "libudev1-32bit-228-150.66.4.s390x", product: { name: "libudev1-32bit-228-150.66.4.s390x", product_id: "libudev1-32bit-228-150.66.4.s390x", }, }, { category: "product_version", name: "nss-myhostname-228-150.66.4.s390x", product: { name: "nss-myhostname-228-150.66.4.s390x", product_id: "nss-myhostname-228-150.66.4.s390x", }, }, { category: "product_version", name: "nss-myhostname-32bit-228-150.66.4.s390x", product: { name: "nss-myhostname-32bit-228-150.66.4.s390x", product_id: "nss-myhostname-32bit-228-150.66.4.s390x", }, }, { category: "product_version", name: "nss-mymachines-228-150.66.4.s390x", product: { name: "nss-mymachines-228-150.66.4.s390x", product_id: "nss-mymachines-228-150.66.4.s390x", }, }, { category: "product_version", name: "systemd-228-150.66.4.s390x", product: { name: "systemd-228-150.66.4.s390x", product_id: "systemd-228-150.66.4.s390x", }, }, { category: "product_version", name: "systemd-32bit-228-150.66.4.s390x", product: { name: "systemd-32bit-228-150.66.4.s390x", product_id: "systemd-32bit-228-150.66.4.s390x", }, }, { category: "product_version", name: "systemd-devel-228-150.66.4.s390x", product: { name: "systemd-devel-228-150.66.4.s390x", product_id: "systemd-devel-228-150.66.4.s390x", }, }, { category: "product_version", name: "systemd-logger-228-150.66.4.s390x", product: { name: "systemd-logger-228-150.66.4.s390x", product_id: "systemd-logger-228-150.66.4.s390x", }, }, { category: "product_version", name: "systemd-mini-228-150.66.2.s390x", product: { name: "systemd-mini-228-150.66.2.s390x", product_id: "systemd-mini-228-150.66.2.s390x", }, }, { category: "product_version", name: "systemd-mini-devel-228-150.66.2.s390x", product: { name: "systemd-mini-devel-228-150.66.2.s390x", product_id: "systemd-mini-devel-228-150.66.2.s390x", }, }, { category: "product_version", name: "systemd-mini-sysvinit-228-150.66.2.s390x", product: { name: "systemd-mini-sysvinit-228-150.66.2.s390x", product_id: "systemd-mini-sysvinit-228-150.66.2.s390x", }, }, { category: "product_version", name: "systemd-sysvinit-228-150.66.4.s390x", product: { name: "systemd-sysvinit-228-150.66.4.s390x", product_id: "systemd-sysvinit-228-150.66.4.s390x", }, }, { category: "product_version", name: "udev-228-150.66.4.s390x", product: { name: "udev-228-150.66.4.s390x", product_id: "udev-228-150.66.4.s390x", }, }, { category: "product_version", name: "udev-mini-228-150.66.2.s390x", product: { name: "udev-mini-228-150.66.2.s390x", product_id: "udev-mini-228-150.66.2.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libsystemd0-228-150.66.4.x86_64", product: { name: "libsystemd0-228-150.66.4.x86_64", product_id: "libsystemd0-228-150.66.4.x86_64", }, }, { category: "product_version", name: "libsystemd0-32bit-228-150.66.4.x86_64", product: { name: "libsystemd0-32bit-228-150.66.4.x86_64", product_id: "libsystemd0-32bit-228-150.66.4.x86_64", }, }, { category: "product_version", name: "libsystemd0-mini-228-150.66.2.x86_64", product: { name: "libsystemd0-mini-228-150.66.2.x86_64", product_id: "libsystemd0-mini-228-150.66.2.x86_64", }, }, { category: "product_version", name: "libudev-devel-228-150.66.4.x86_64", product: { name: "libudev-devel-228-150.66.4.x86_64", product_id: "libudev-devel-228-150.66.4.x86_64", }, }, { category: "product_version", name: "libudev-mini-devel-228-150.66.2.x86_64", product: { name: "libudev-mini-devel-228-150.66.2.x86_64", product_id: "libudev-mini-devel-228-150.66.2.x86_64", }, }, { category: "product_version", name: "libudev-mini1-228-150.66.2.x86_64", product: { name: "libudev-mini1-228-150.66.2.x86_64", product_id: "libudev-mini1-228-150.66.2.x86_64", }, }, { category: "product_version", name: "libudev1-228-150.66.4.x86_64", product: { name: "libudev1-228-150.66.4.x86_64", product_id: "libudev1-228-150.66.4.x86_64", }, }, { category: "product_version", name: "libudev1-32bit-228-150.66.4.x86_64", product: { name: "libudev1-32bit-228-150.66.4.x86_64", product_id: "libudev1-32bit-228-150.66.4.x86_64", }, }, { category: "product_version", name: "nss-myhostname-228-150.66.4.x86_64", product: { name: "nss-myhostname-228-150.66.4.x86_64", product_id: "nss-myhostname-228-150.66.4.x86_64", }, }, { category: "product_version", name: "nss-myhostname-32bit-228-150.66.4.x86_64", product: { name: "nss-myhostname-32bit-228-150.66.4.x86_64", product_id: "nss-myhostname-32bit-228-150.66.4.x86_64", }, }, { category: "product_version", name: "nss-mymachines-228-150.66.4.x86_64", product: { name: "nss-mymachines-228-150.66.4.x86_64", product_id: "nss-mymachines-228-150.66.4.x86_64", }, }, { category: "product_version", name: "systemd-228-150.66.4.x86_64", product: { name: "systemd-228-150.66.4.x86_64", product_id: "systemd-228-150.66.4.x86_64", }, }, { category: "product_version", name: "systemd-32bit-228-150.66.4.x86_64", product: { name: "systemd-32bit-228-150.66.4.x86_64", product_id: "systemd-32bit-228-150.66.4.x86_64", }, }, { category: "product_version", name: "systemd-devel-228-150.66.4.x86_64", product: { name: "systemd-devel-228-150.66.4.x86_64", product_id: "systemd-devel-228-150.66.4.x86_64", }, }, { category: "product_version", name: "systemd-logger-228-150.66.4.x86_64", product: { name: "systemd-logger-228-150.66.4.x86_64", product_id: "systemd-logger-228-150.66.4.x86_64", }, }, { category: "product_version", name: "systemd-mini-228-150.66.2.x86_64", product: { name: "systemd-mini-228-150.66.2.x86_64", product_id: "systemd-mini-228-150.66.2.x86_64", }, }, { category: "product_version", name: "systemd-mini-devel-228-150.66.2.x86_64", product: { name: "systemd-mini-devel-228-150.66.2.x86_64", product_id: "systemd-mini-devel-228-150.66.2.x86_64", }, }, { category: "product_version", name: "systemd-mini-sysvinit-228-150.66.2.x86_64", product: { name: "systemd-mini-sysvinit-228-150.66.2.x86_64", product_id: "systemd-mini-sysvinit-228-150.66.2.x86_64", }, }, { category: "product_version", name: "systemd-sysvinit-228-150.66.4.x86_64", product: { name: "systemd-sysvinit-228-150.66.4.x86_64", product_id: "systemd-sysvinit-228-150.66.4.x86_64", }, }, { category: "product_version", name: "udev-228-150.66.4.x86_64", product: { name: "udev-228-150.66.4.x86_64", product_id: "udev-228-150.66.4.x86_64", }, }, { category: "product_version", name: "udev-mini-228-150.66.2.x86_64", product: { name: "udev-mini-228-150.66.2.x86_64", product_id: "udev-mini-228-150.66.2.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 7", product: { name: "SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:7", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP3", product: { name: "SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Desktop 12 SP4", product: { name: "SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sled:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP4", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3", product: { name: "SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4", product: { name: "SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 4", product: { name: "SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4", product_identification_helper: { cpe: "cpe:/o:suse:ses:4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x", }, product_reference: "libsystemd0-228-150.66.4.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64", }, product_reference: "libsystemd0-228-150.66.4.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-228-150.66.4.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x", }, product_reference: "libsystemd0-32bit-228-150.66.4.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64", }, product_reference: "libsystemd0-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-228-150.66.4.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x", }, product_reference: "libudev-devel-228-150.66.4.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-228-150.66.4.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64", }, product_reference: "libudev-devel-228-150.66.4.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x", }, product_reference: "libudev1-228-150.66.4.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64", }, product_reference: "libudev1-228-150.66.4.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-228-150.66.4.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x", }, product_reference: "libudev1-32bit-228-150.66.4.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64", }, product_reference: "libudev1-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x", }, product_reference: "systemd-228-150.66.4.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64", }, product_reference: "systemd-228-150.66.4.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-228-150.66.4.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x", }, product_reference: "systemd-32bit-228-150.66.4.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-228-150.66.4.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64", }, product_reference: "systemd-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "systemd-bash-completion-228-150.66.4.noarch as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch", }, product_reference: "systemd-bash-completion-228-150.66.4.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x", }, product_reference: "systemd-sysvinit-228-150.66.4.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64", }, product_reference: "systemd-sysvinit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x", }, product_reference: "udev-228-150.66.4.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64", }, product_reference: "udev-228-150.66.4.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64", }, product_reference: "libsystemd0-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", }, product_reference: "libsystemd0-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64", }, product_reference: "libudev1-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64", }, product_reference: "libudev1-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64", }, product_reference: "systemd-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64", }, product_reference: "systemd-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch", }, product_reference: "systemd-bash-completion-228-150.66.4.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", }, product_reference: "systemd-sysvinit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", product_id: "SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64", }, product_reference: "udev-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64", }, product_reference: "libsystemd0-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", }, product_reference: "libsystemd0-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64", }, product_reference: "libudev1-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64", }, product_reference: "libudev1-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64", }, product_reference: "systemd-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64", }, product_reference: "systemd-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch", }, product_reference: "systemd-bash-completion-228-150.66.4.noarch", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", }, product_reference: "systemd-sysvinit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", product_id: "SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64", }, product_reference: "udev-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Desktop 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le", }, product_reference: "libsystemd0-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64", }, product_reference: "libsystemd0-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64", }, product_reference: "libsystemd0-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le", }, product_reference: "libudev-devel-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64", }, product_reference: "libudev-devel-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le", }, product_reference: "libudev1-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64", }, product_reference: "libudev1-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64", }, product_reference: "libudev1-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le", }, product_reference: "systemd-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64", }, product_reference: "systemd-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64", }, product_reference: "systemd-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch", }, product_reference: "systemd-bash-completion-228-150.66.4.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le", }, product_reference: "systemd-sysvinit-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64", }, product_reference: "systemd-sysvinit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le", }, product_reference: "udev-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64", }, product_reference: "udev-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64", }, product_reference: "libudev-devel-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le", }, product_reference: "libudev-devel-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-228-150.66.4.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x", }, product_reference: "libudev-devel-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64", }, product_reference: "libudev-devel-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64", }, product_reference: "systemd-devel-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le", }, product_reference: "systemd-devel-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-228-150.66.4.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x", }, product_reference: "systemd-devel-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64", }, product_reference: "systemd-devel-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64", }, product_reference: "libudev-devel-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le", }, product_reference: "libudev-devel-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-228-150.66.4.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x", }, product_reference: "libudev-devel-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64", }, product_reference: "libudev-devel-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64", }, product_reference: "systemd-devel-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le", }, product_reference: "systemd-devel-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-228-150.66.4.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x", }, product_reference: "systemd-devel-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64", }, product_reference: "systemd-devel-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le", }, product_reference: "libsystemd0-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x", }, product_reference: "libsystemd0-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64", }, product_reference: "libsystemd0-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x", }, product_reference: "libsystemd0-32bit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64", }, product_reference: "libsystemd0-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le", }, product_reference: "libudev-devel-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x", }, product_reference: "libudev-devel-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64", }, product_reference: "libudev-devel-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le", }, product_reference: "libudev1-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x", }, product_reference: "libudev1-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64", }, product_reference: "libudev1-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x", }, product_reference: "libudev1-32bit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64", }, product_reference: "libudev1-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le", }, product_reference: "systemd-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x", }, product_reference: "systemd-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64", }, product_reference: "systemd-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x", }, product_reference: "systemd-32bit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64", }, product_reference: "systemd-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch", }, product_reference: "systemd-bash-completion-228-150.66.4.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le", }, product_reference: "systemd-sysvinit-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x", }, product_reference: "systemd-sysvinit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64", }, product_reference: "systemd-sysvinit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le", }, product_reference: "udev-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x", }, product_reference: "udev-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64", }, product_reference: "udev-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64", }, product_reference: "libsystemd0-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64", }, product_reference: "libsystemd0-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64", }, product_reference: "libudev1-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64", }, product_reference: "libudev1-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64", }, product_reference: "systemd-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64", }, product_reference: "systemd-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch", }, product_reference: "systemd-bash-completion-228-150.66.4.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64", }, product_reference: "systemd-sysvinit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64", }, product_reference: "udev-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64", }, product_reference: "libsystemd0-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le", }, product_reference: "libsystemd0-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x", }, product_reference: "libsystemd0-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64", }, product_reference: "libsystemd0-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", }, product_reference: "libsystemd0-32bit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", }, product_reference: "libsystemd0-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64", }, product_reference: "libudev1-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le", }, product_reference: "libudev1-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x", }, product_reference: "libudev1-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64", }, product_reference: "libudev1-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x", }, product_reference: "libudev1-32bit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64", }, product_reference: "libudev1-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64", }, product_reference: "systemd-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le", }, product_reference: "systemd-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x", }, product_reference: "systemd-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64", }, product_reference: "systemd-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x", }, product_reference: "systemd-32bit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64", }, product_reference: "systemd-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch", }, product_reference: "systemd-bash-completion-228-150.66.4.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", }, product_reference: "systemd-sysvinit-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", }, product_reference: "systemd-sysvinit-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x", }, product_reference: "systemd-sysvinit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", }, product_reference: "systemd-sysvinit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64", }, product_reference: "udev-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le", }, product_reference: "udev-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x", }, product_reference: "udev-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", product_id: "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64", }, product_reference: "udev-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64", }, product_reference: "libsystemd0-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le", }, product_reference: "libsystemd0-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x", }, product_reference: "libsystemd0-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64", }, product_reference: "libsystemd0-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", }, product_reference: "libsystemd0-32bit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", }, product_reference: "libsystemd0-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64", }, product_reference: "libudev1-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le", }, product_reference: "libudev1-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x", }, product_reference: "libudev1-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64", }, product_reference: "libudev1-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x", }, product_reference: "libudev1-32bit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64", }, product_reference: "libudev1-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64", }, product_reference: "systemd-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le", }, product_reference: "systemd-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x", }, product_reference: "systemd-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64", }, product_reference: "systemd-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x", }, product_reference: "systemd-32bit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64", }, product_reference: "systemd-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch", }, product_reference: "systemd-bash-completion-228-150.66.4.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", }, product_reference: "systemd-sysvinit-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", }, product_reference: "systemd-sysvinit-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x", }, product_reference: "systemd-sysvinit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", }, product_reference: "systemd-sysvinit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64", }, product_reference: "udev-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le", }, product_reference: "udev-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x", }, product_reference: "udev-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64", }, product_reference: "udev-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64", }, product_reference: "libsystemd0-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le", }, product_reference: "libsystemd0-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x", }, product_reference: "libsystemd0-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64", }, product_reference: "libsystemd0-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", }, product_reference: "libsystemd0-32bit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", }, product_reference: "libsystemd0-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64", }, product_reference: "libudev1-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le", }, product_reference: "libudev1-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x", }, product_reference: "libudev1-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64", }, product_reference: "libudev1-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x", }, product_reference: "libudev1-32bit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64", }, product_reference: "libudev1-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64", }, product_reference: "systemd-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le", }, product_reference: "systemd-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x", }, product_reference: "systemd-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64", }, product_reference: "systemd-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x", }, product_reference: "systemd-32bit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64", }, product_reference: "systemd-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch", }, product_reference: "systemd-bash-completion-228-150.66.4.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", }, product_reference: "systemd-sysvinit-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", }, product_reference: "systemd-sysvinit-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x", }, product_reference: "systemd-sysvinit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", }, product_reference: "systemd-sysvinit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64", }, product_reference: "udev-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le", }, product_reference: "udev-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x", }, product_reference: "udev-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", product_id: "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64", }, product_reference: "udev-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64", }, product_reference: "libsystemd0-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le", }, product_reference: "libsystemd0-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x", }, product_reference: "libsystemd0-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64", }, product_reference: "libsystemd0-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", }, product_reference: "libsystemd0-32bit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", }, product_reference: "libsystemd0-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64", }, product_reference: "libudev1-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le", }, product_reference: "libudev1-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x", }, product_reference: "libudev1-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64", }, product_reference: "libudev1-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x", }, product_reference: "libudev1-32bit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64", }, product_reference: "libudev1-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64", }, product_reference: "systemd-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le", }, product_reference: "systemd-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x", }, product_reference: "systemd-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64", }, product_reference: "systemd-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x", }, product_reference: "systemd-32bit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64", }, product_reference: "systemd-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch", }, product_reference: "systemd-bash-completion-228-150.66.4.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", }, product_reference: "systemd-sysvinit-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", }, product_reference: "systemd-sysvinit-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x", }, product_reference: "systemd-sysvinit-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", }, product_reference: "systemd-sysvinit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64", }, product_reference: "udev-228-150.66.4.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le", }, product_reference: "udev-228-150.66.4.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x", }, product_reference: "udev-228-150.66.4.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64", }, product_reference: "udev-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-228-150.66.4.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64", }, product_reference: "libsystemd0-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64", }, product_reference: "libsystemd0-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-228-150.66.4.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64", }, product_reference: "libudev-devel-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "libudev1-228-150.66.4.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64", }, product_reference: "libudev1-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64", }, product_reference: "libudev1-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "systemd-228-150.66.4.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64", }, product_reference: "systemd-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64", }, product_reference: "systemd-32bit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch", }, product_reference: "systemd-bash-completion-228-150.66.4.noarch", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64", }, product_reference: "systemd-sysvinit-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, { category: "default_component_of", full_product_name: { name: "udev-228-150.66.4.x86_64 as component of SUSE Enterprise Storage 4", product_id: "SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64", }, product_reference: "udev-228-150.66.4.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 4", }, ], }, vulnerabilities: [ { cve: "CVE-2018-6954", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-6954", }, ], notes: [ { category: "general", text: "systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files via vectors involving creation of a directory and a file under that directory, and later replacing that directory with a symlink. This occurs even if the fs.protected_symlinks sysctl is turned on.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch", "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-6954", url: "https://www.suse.com/security/cve/CVE-2018-6954", }, { category: "external", summary: "SUSE Bug 1080919 for CVE-2018-6954", url: "https://bugzilla.suse.com/1080919", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch", "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch", "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-16T07:53:09Z", details: "important", }, ], title: "CVE-2018-6954", }, { cve: "CVE-2019-3842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3842", }, ], notes: [ { category: "general", text: "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch", "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3842", url: "https://www.suse.com/security/cve/CVE-2019-3842", }, { category: "external", summary: "SUSE Bug 1132348 for CVE-2019-3842", url: "https://bugzilla.suse.com/1132348", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch", "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch", "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-16T07:53:09Z", details: "moderate", }, ], title: "CVE-2019-3842", }, { cve: "CVE-2019-6454", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-6454", }, ], notes: [ { category: "general", text: "An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch", "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-6454", url: "https://www.suse.com/security/cve/CVE-2019-6454", }, { category: "external", summary: "SUSE Bug 1125352 for CVE-2019-6454", url: "https://bugzilla.suse.com/1125352", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch", "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch", "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64", "SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x", "SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-16T07:53:09Z", details: "important", }, ], title: "CVE-2019-6454", }, ], }
suse-su-2019:1364-1
Vulnerability from csaf_suse
Notes
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for systemd", title: "Title of the patch", }, { category: "description", text: "This update for systemd fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-3842: Fixed a privilege escalation in pam_systemd which could be exploited by a local user (bsc#1132348).\n- CVE-2019-6454: Fixed a denial of service via crafted D-Bus message (bsc#1125352).\n- CVE-2019-3843, CVE-2019-3844: Fixed a privilege escalation where services with DynamicUser could gain new privileges or create SUID/SGID binaries (bsc#1133506, bsc#1133509).\n\nNon-security issued fixed:\n\n- logind: fix killing of scopes (bsc#1125604)\n- namespace: make MountFlags=shared work again (bsc#1124122)\n- rules: load drivers only on 'add' events (bsc#1126056)\n- sysctl: Don't pass null directive argument to '%s' (bsc#1121563)\n- systemd-coredump: generate a stack trace of all core dumps and log into the journal (jsc#SLE-5933)\n- udevd: notify when max number value of children is reached only once per batch of events (bsc#1132400)\n- sd-bus: bump message queue size again (bsc#1132721)\n- Do not automatically online memory on s390x (bsc#1127557)\n- Removed sg.conf (bsc#1036463)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2019-1364,SUSE-SLE-Module-Basesystem-15-2019-1364,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1364", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1364-1.json", }, { category: "self", summary: "URL for SUSE-SU-2019:1364-1", url: "https://www.suse.com/support/update/announcement/2019/suse-su-20191364-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2019:1364-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2019-May/005509.html", }, { category: "self", summary: "SUSE Bug 1036463", url: "https://bugzilla.suse.com/1036463", }, { category: "self", summary: "SUSE Bug 1121563", url: "https://bugzilla.suse.com/1121563", }, { category: "self", summary: "SUSE Bug 1124122", url: "https://bugzilla.suse.com/1124122", }, { category: "self", summary: "SUSE Bug 1125352", url: "https://bugzilla.suse.com/1125352", }, { category: "self", summary: "SUSE Bug 1125604", url: "https://bugzilla.suse.com/1125604", }, { category: "self", summary: "SUSE Bug 1126056", url: "https://bugzilla.suse.com/1126056", }, { category: "self", summary: "SUSE Bug 1127557", url: "https://bugzilla.suse.com/1127557", }, { category: "self", summary: "SUSE Bug 1130230", url: "https://bugzilla.suse.com/1130230", }, { category: "self", summary: "SUSE Bug 1132348", url: "https://bugzilla.suse.com/1132348", }, { category: "self", summary: "SUSE Bug 1132400", url: "https://bugzilla.suse.com/1132400", }, { category: "self", summary: "SUSE Bug 1132721", url: "https://bugzilla.suse.com/1132721", }, { category: "self", summary: "SUSE Bug 1133506", url: "https://bugzilla.suse.com/1133506", }, { category: "self", summary: "SUSE Bug 1133509", url: "https://bugzilla.suse.com/1133509", }, { category: "self", summary: "SUSE CVE CVE-2019-3842 page", url: "https://www.suse.com/security/cve/CVE-2019-3842/", }, { category: "self", summary: "SUSE CVE CVE-2019-3843 page", url: "https://www.suse.com/security/cve/CVE-2019-3843/", }, { category: "self", summary: "SUSE CVE CVE-2019-3844 page", url: "https://www.suse.com/security/cve/CVE-2019-3844/", }, { category: "self", summary: "SUSE CVE CVE-2019-6454 page", url: "https://www.suse.com/security/cve/CVE-2019-6454/", }, { category: "self", summary: "SUSE Bug SLE-5933", url: "https://bugzilla.suse.com/SLE-5933", }, ], title: "Security update for systemd", tracking: { current_release_date: "2019-05-28T08:51:42Z", generator: { date: "2019-05-28T08:51:42Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2019:1364-1", initial_release_date: "2019-05-28T08:51:42Z", revision_history: [ { date: "2019-05-28T08:51:42Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "libsystemd0-234-24.30.1.aarch64", product: { name: "libsystemd0-234-24.30.1.aarch64", product_id: "libsystemd0-234-24.30.1.aarch64", }, }, { category: "product_version", name: "libsystemd0-mini-234-24.30.1.aarch64", product: { name: "libsystemd0-mini-234-24.30.1.aarch64", product_id: "libsystemd0-mini-234-24.30.1.aarch64", }, }, { category: "product_version", name: "libudev-devel-234-24.30.1.aarch64", product: { name: "libudev-devel-234-24.30.1.aarch64", product_id: "libudev-devel-234-24.30.1.aarch64", }, }, { category: "product_version", name: "libudev-mini-devel-234-24.30.1.aarch64", product: { name: "libudev-mini-devel-234-24.30.1.aarch64", product_id: "libudev-mini-devel-234-24.30.1.aarch64", }, }, { category: "product_version", name: "libudev-mini1-234-24.30.1.aarch64", product: { name: "libudev-mini1-234-24.30.1.aarch64", product_id: "libudev-mini1-234-24.30.1.aarch64", }, }, { category: "product_version", name: "libudev1-234-24.30.1.aarch64", product: { name: "libudev1-234-24.30.1.aarch64", product_id: "libudev1-234-24.30.1.aarch64", }, }, { category: "product_version", name: "nss-myhostname-234-24.30.1.aarch64", product: { name: "nss-myhostname-234-24.30.1.aarch64", product_id: "nss-myhostname-234-24.30.1.aarch64", }, }, { category: "product_version", name: "nss-mymachines-234-24.30.1.aarch64", product: { name: "nss-mymachines-234-24.30.1.aarch64", product_id: "nss-mymachines-234-24.30.1.aarch64", }, }, { category: "product_version", name: "nss-systemd-234-24.30.1.aarch64", product: { name: "nss-systemd-234-24.30.1.aarch64", product_id: "nss-systemd-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-234-24.30.1.aarch64", product: { name: "systemd-234-24.30.1.aarch64", product_id: "systemd-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-container-234-24.30.1.aarch64", product: { name: "systemd-container-234-24.30.1.aarch64", product_id: "systemd-container-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-coredump-234-24.30.1.aarch64", product: { name: "systemd-coredump-234-24.30.1.aarch64", product_id: "systemd-coredump-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-devel-234-24.30.1.aarch64", product: { name: "systemd-devel-234-24.30.1.aarch64", product_id: "systemd-devel-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-logger-234-24.30.1.aarch64", product: { name: "systemd-logger-234-24.30.1.aarch64", product_id: "systemd-logger-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-mini-234-24.30.1.aarch64", product: { name: "systemd-mini-234-24.30.1.aarch64", product_id: "systemd-mini-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-mini-container-mini-234-24.30.1.aarch64", product: { name: "systemd-mini-container-mini-234-24.30.1.aarch64", product_id: "systemd-mini-container-mini-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-mini-coredump-mini-234-24.30.1.aarch64", product: { name: "systemd-mini-coredump-mini-234-24.30.1.aarch64", product_id: "systemd-mini-coredump-mini-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-mini-devel-234-24.30.1.aarch64", product: { name: "systemd-mini-devel-234-24.30.1.aarch64", product_id: "systemd-mini-devel-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-mini-sysvinit-234-24.30.1.aarch64", product: { name: "systemd-mini-sysvinit-234-24.30.1.aarch64", product_id: "systemd-mini-sysvinit-234-24.30.1.aarch64", }, }, { category: "product_version", name: "systemd-sysvinit-234-24.30.1.aarch64", product: { name: "systemd-sysvinit-234-24.30.1.aarch64", product_id: "systemd-sysvinit-234-24.30.1.aarch64", }, }, { category: "product_version", name: "udev-234-24.30.1.aarch64", product: { name: "udev-234-24.30.1.aarch64", product_id: "udev-234-24.30.1.aarch64", }, }, { category: "product_version", name: "udev-mini-234-24.30.1.aarch64", product: { name: "udev-mini-234-24.30.1.aarch64", product_id: "udev-mini-234-24.30.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "libsystemd0-64bit-234-24.30.1.aarch64_ilp32", product: { name: "libsystemd0-64bit-234-24.30.1.aarch64_ilp32", product_id: "libsystemd0-64bit-234-24.30.1.aarch64_ilp32", }, }, { category: "product_version", name: "libudev-devel-64bit-234-24.30.1.aarch64_ilp32", product: { name: "libudev-devel-64bit-234-24.30.1.aarch64_ilp32", product_id: "libudev-devel-64bit-234-24.30.1.aarch64_ilp32", }, }, { category: "product_version", name: "libudev1-64bit-234-24.30.1.aarch64_ilp32", product: { name: "libudev1-64bit-234-24.30.1.aarch64_ilp32", product_id: "libudev1-64bit-234-24.30.1.aarch64_ilp32", }, }, { category: "product_version", name: "nss-myhostname-64bit-234-24.30.1.aarch64_ilp32", product: { name: "nss-myhostname-64bit-234-24.30.1.aarch64_ilp32", product_id: "nss-myhostname-64bit-234-24.30.1.aarch64_ilp32", }, }, { category: "product_version", name: "nss-mymachines-64bit-234-24.30.1.aarch64_ilp32", product: { name: "nss-mymachines-64bit-234-24.30.1.aarch64_ilp32", product_id: "nss-mymachines-64bit-234-24.30.1.aarch64_ilp32", }, }, { category: "product_version", name: "systemd-64bit-234-24.30.1.aarch64_ilp32", product: { name: "systemd-64bit-234-24.30.1.aarch64_ilp32", product_id: "systemd-64bit-234-24.30.1.aarch64_ilp32", }, }, ], category: "architecture", name: "aarch64_ilp32", }, { branches: [ { category: "product_version", name: "libsystemd0-234-24.30.1.i586", product: { name: "libsystemd0-234-24.30.1.i586", product_id: "libsystemd0-234-24.30.1.i586", }, }, { category: "product_version", name: "libsystemd0-mini-234-24.30.1.i586", product: { name: "libsystemd0-mini-234-24.30.1.i586", product_id: "libsystemd0-mini-234-24.30.1.i586", }, }, { category: "product_version", name: "libudev-devel-234-24.30.1.i586", product: { name: "libudev-devel-234-24.30.1.i586", product_id: "libudev-devel-234-24.30.1.i586", }, }, { category: "product_version", name: "libudev-mini-devel-234-24.30.1.i586", product: { name: "libudev-mini-devel-234-24.30.1.i586", product_id: "libudev-mini-devel-234-24.30.1.i586", }, }, { category: "product_version", name: "libudev-mini1-234-24.30.1.i586", product: { name: "libudev-mini1-234-24.30.1.i586", product_id: "libudev-mini1-234-24.30.1.i586", }, }, { category: "product_version", name: "libudev1-234-24.30.1.i586", product: { name: "libudev1-234-24.30.1.i586", product_id: "libudev1-234-24.30.1.i586", }, }, { category: "product_version", name: "nss-myhostname-234-24.30.1.i586", product: { name: "nss-myhostname-234-24.30.1.i586", product_id: "nss-myhostname-234-24.30.1.i586", }, }, { category: "product_version", name: "nss-mymachines-234-24.30.1.i586", product: { name: "nss-mymachines-234-24.30.1.i586", product_id: "nss-mymachines-234-24.30.1.i586", }, }, { category: "product_version", name: "nss-systemd-234-24.30.1.i586", product: { name: "nss-systemd-234-24.30.1.i586", product_id: "nss-systemd-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-234-24.30.1.i586", product: { name: "systemd-234-24.30.1.i586", product_id: "systemd-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-container-234-24.30.1.i586", product: { name: "systemd-container-234-24.30.1.i586", product_id: "systemd-container-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-coredump-234-24.30.1.i586", product: { name: "systemd-coredump-234-24.30.1.i586", product_id: "systemd-coredump-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-devel-234-24.30.1.i586", product: { name: "systemd-devel-234-24.30.1.i586", product_id: "systemd-devel-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-logger-234-24.30.1.i586", product: { name: "systemd-logger-234-24.30.1.i586", product_id: "systemd-logger-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-mini-234-24.30.1.i586", product: { name: "systemd-mini-234-24.30.1.i586", product_id: "systemd-mini-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-mini-container-mini-234-24.30.1.i586", product: { name: "systemd-mini-container-mini-234-24.30.1.i586", product_id: "systemd-mini-container-mini-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-mini-coredump-mini-234-24.30.1.i586", product: { name: "systemd-mini-coredump-mini-234-24.30.1.i586", product_id: "systemd-mini-coredump-mini-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-mini-devel-234-24.30.1.i586", product: { name: "systemd-mini-devel-234-24.30.1.i586", product_id: "systemd-mini-devel-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-mini-sysvinit-234-24.30.1.i586", product: { name: "systemd-mini-sysvinit-234-24.30.1.i586", product_id: "systemd-mini-sysvinit-234-24.30.1.i586", }, }, { category: "product_version", name: "systemd-sysvinit-234-24.30.1.i586", product: { name: "systemd-sysvinit-234-24.30.1.i586", product_id: "systemd-sysvinit-234-24.30.1.i586", }, }, { category: "product_version", name: "udev-234-24.30.1.i586", product: { name: "udev-234-24.30.1.i586", product_id: "udev-234-24.30.1.i586", }, }, { category: "product_version", name: "udev-mini-234-24.30.1.i586", product: { name: "udev-mini-234-24.30.1.i586", product_id: "udev-mini-234-24.30.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "systemd-bash-completion-234-24.30.1.noarch", product: { name: "systemd-bash-completion-234-24.30.1.noarch", product_id: "systemd-bash-completion-234-24.30.1.noarch", }, }, { category: "product_version", name: "systemd-mini-bash-completion-234-24.30.1.noarch", product: { name: "systemd-mini-bash-completion-234-24.30.1.noarch", product_id: "systemd-mini-bash-completion-234-24.30.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "libsystemd0-234-24.30.1.ppc64le", product: { name: "libsystemd0-234-24.30.1.ppc64le", product_id: "libsystemd0-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "libsystemd0-mini-234-24.30.1.ppc64le", product: { name: "libsystemd0-mini-234-24.30.1.ppc64le", product_id: "libsystemd0-mini-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "libudev-devel-234-24.30.1.ppc64le", product: { name: "libudev-devel-234-24.30.1.ppc64le", product_id: "libudev-devel-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "libudev-mini-devel-234-24.30.1.ppc64le", product: { name: "libudev-mini-devel-234-24.30.1.ppc64le", product_id: "libudev-mini-devel-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "libudev-mini1-234-24.30.1.ppc64le", product: { name: "libudev-mini1-234-24.30.1.ppc64le", product_id: "libudev-mini1-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "libudev1-234-24.30.1.ppc64le", product: { name: "libudev1-234-24.30.1.ppc64le", product_id: "libudev1-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "nss-myhostname-234-24.30.1.ppc64le", product: { name: "nss-myhostname-234-24.30.1.ppc64le", product_id: "nss-myhostname-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "nss-mymachines-234-24.30.1.ppc64le", product: { name: "nss-mymachines-234-24.30.1.ppc64le", product_id: "nss-mymachines-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "nss-systemd-234-24.30.1.ppc64le", product: { name: "nss-systemd-234-24.30.1.ppc64le", product_id: "nss-systemd-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-234-24.30.1.ppc64le", product: { name: "systemd-234-24.30.1.ppc64le", product_id: "systemd-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-container-234-24.30.1.ppc64le", product: { name: "systemd-container-234-24.30.1.ppc64le", product_id: "systemd-container-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-coredump-234-24.30.1.ppc64le", product: { name: "systemd-coredump-234-24.30.1.ppc64le", product_id: "systemd-coredump-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-devel-234-24.30.1.ppc64le", product: { name: "systemd-devel-234-24.30.1.ppc64le", product_id: "systemd-devel-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-logger-234-24.30.1.ppc64le", product: { name: "systemd-logger-234-24.30.1.ppc64le", product_id: "systemd-logger-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-mini-234-24.30.1.ppc64le", product: { name: "systemd-mini-234-24.30.1.ppc64le", product_id: "systemd-mini-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-mini-container-mini-234-24.30.1.ppc64le", product: { name: "systemd-mini-container-mini-234-24.30.1.ppc64le", product_id: "systemd-mini-container-mini-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-mini-coredump-mini-234-24.30.1.ppc64le", product: { name: "systemd-mini-coredump-mini-234-24.30.1.ppc64le", product_id: "systemd-mini-coredump-mini-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-mini-devel-234-24.30.1.ppc64le", product: { name: "systemd-mini-devel-234-24.30.1.ppc64le", product_id: "systemd-mini-devel-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-mini-sysvinit-234-24.30.1.ppc64le", product: { name: "systemd-mini-sysvinit-234-24.30.1.ppc64le", product_id: "systemd-mini-sysvinit-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "systemd-sysvinit-234-24.30.1.ppc64le", product: { name: "systemd-sysvinit-234-24.30.1.ppc64le", product_id: "systemd-sysvinit-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "udev-234-24.30.1.ppc64le", product: { name: "udev-234-24.30.1.ppc64le", product_id: "udev-234-24.30.1.ppc64le", }, }, { category: "product_version", name: "udev-mini-234-24.30.1.ppc64le", product: { name: "udev-mini-234-24.30.1.ppc64le", product_id: "udev-mini-234-24.30.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "libsystemd0-234-24.30.1.s390x", product: { name: "libsystemd0-234-24.30.1.s390x", product_id: "libsystemd0-234-24.30.1.s390x", }, }, { category: "product_version", name: "libsystemd0-mini-234-24.30.1.s390x", product: { name: "libsystemd0-mini-234-24.30.1.s390x", product_id: "libsystemd0-mini-234-24.30.1.s390x", }, }, { category: "product_version", name: "libudev-devel-234-24.30.1.s390x", product: { name: "libudev-devel-234-24.30.1.s390x", product_id: "libudev-devel-234-24.30.1.s390x", }, }, { category: "product_version", name: "libudev-mini-devel-234-24.30.1.s390x", product: { name: "libudev-mini-devel-234-24.30.1.s390x", product_id: "libudev-mini-devel-234-24.30.1.s390x", }, }, { category: "product_version", name: "libudev-mini1-234-24.30.1.s390x", product: { name: "libudev-mini1-234-24.30.1.s390x", product_id: "libudev-mini1-234-24.30.1.s390x", }, }, { category: "product_version", name: "libudev1-234-24.30.1.s390x", product: { name: "libudev1-234-24.30.1.s390x", product_id: "libudev1-234-24.30.1.s390x", }, }, { category: "product_version", name: "nss-myhostname-234-24.30.1.s390x", product: { name: "nss-myhostname-234-24.30.1.s390x", product_id: "nss-myhostname-234-24.30.1.s390x", }, }, { category: "product_version", name: "nss-mymachines-234-24.30.1.s390x", product: { name: "nss-mymachines-234-24.30.1.s390x", product_id: "nss-mymachines-234-24.30.1.s390x", }, }, { category: "product_version", name: "nss-systemd-234-24.30.1.s390x", product: { name: "nss-systemd-234-24.30.1.s390x", product_id: "nss-systemd-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-234-24.30.1.s390x", product: { name: "systemd-234-24.30.1.s390x", product_id: "systemd-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-container-234-24.30.1.s390x", product: { name: "systemd-container-234-24.30.1.s390x", product_id: "systemd-container-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-coredump-234-24.30.1.s390x", product: { name: "systemd-coredump-234-24.30.1.s390x", product_id: "systemd-coredump-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-devel-234-24.30.1.s390x", product: { name: "systemd-devel-234-24.30.1.s390x", product_id: "systemd-devel-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-logger-234-24.30.1.s390x", product: { name: "systemd-logger-234-24.30.1.s390x", product_id: "systemd-logger-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-mini-234-24.30.1.s390x", product: { name: "systemd-mini-234-24.30.1.s390x", product_id: "systemd-mini-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-mini-container-mini-234-24.30.1.s390x", product: { name: "systemd-mini-container-mini-234-24.30.1.s390x", product_id: "systemd-mini-container-mini-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-mini-coredump-mini-234-24.30.1.s390x", product: { name: "systemd-mini-coredump-mini-234-24.30.1.s390x", product_id: "systemd-mini-coredump-mini-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-mini-devel-234-24.30.1.s390x", product: { name: "systemd-mini-devel-234-24.30.1.s390x", product_id: "systemd-mini-devel-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-mini-sysvinit-234-24.30.1.s390x", product: { name: "systemd-mini-sysvinit-234-24.30.1.s390x", product_id: "systemd-mini-sysvinit-234-24.30.1.s390x", }, }, { category: "product_version", name: "systemd-sysvinit-234-24.30.1.s390x", product: { name: "systemd-sysvinit-234-24.30.1.s390x", product_id: "systemd-sysvinit-234-24.30.1.s390x", }, }, { category: "product_version", name: "udev-234-24.30.1.s390x", product: { name: "udev-234-24.30.1.s390x", product_id: "udev-234-24.30.1.s390x", }, }, { category: "product_version", name: "udev-mini-234-24.30.1.s390x", product: { name: "udev-mini-234-24.30.1.s390x", product_id: "udev-mini-234-24.30.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "libsystemd0-234-24.30.1.x86_64", product: { name: "libsystemd0-234-24.30.1.x86_64", product_id: "libsystemd0-234-24.30.1.x86_64", }, }, { category: "product_version", name: "libsystemd0-32bit-234-24.30.1.x86_64", product: { name: "libsystemd0-32bit-234-24.30.1.x86_64", product_id: "libsystemd0-32bit-234-24.30.1.x86_64", }, }, { category: "product_version", name: "libsystemd0-mini-234-24.30.1.x86_64", product: { name: "libsystemd0-mini-234-24.30.1.x86_64", product_id: "libsystemd0-mini-234-24.30.1.x86_64", }, }, { category: "product_version", name: "libudev-devel-234-24.30.1.x86_64", product: { name: "libudev-devel-234-24.30.1.x86_64", product_id: "libudev-devel-234-24.30.1.x86_64", }, }, { category: "product_version", name: "libudev-devel-32bit-234-24.30.1.x86_64", product: { name: "libudev-devel-32bit-234-24.30.1.x86_64", product_id: "libudev-devel-32bit-234-24.30.1.x86_64", }, }, { category: "product_version", name: "libudev-mini-devel-234-24.30.1.x86_64", product: { name: "libudev-mini-devel-234-24.30.1.x86_64", product_id: "libudev-mini-devel-234-24.30.1.x86_64", }, }, { category: "product_version", name: "libudev-mini1-234-24.30.1.x86_64", product: { name: "libudev-mini1-234-24.30.1.x86_64", product_id: "libudev-mini1-234-24.30.1.x86_64", }, }, { category: "product_version", name: "libudev1-234-24.30.1.x86_64", product: { name: "libudev1-234-24.30.1.x86_64", product_id: "libudev1-234-24.30.1.x86_64", }, }, { category: "product_version", name: "libudev1-32bit-234-24.30.1.x86_64", product: { name: "libudev1-32bit-234-24.30.1.x86_64", product_id: "libudev1-32bit-234-24.30.1.x86_64", }, }, { category: "product_version", name: "nss-myhostname-234-24.30.1.x86_64", product: { name: "nss-myhostname-234-24.30.1.x86_64", product_id: "nss-myhostname-234-24.30.1.x86_64", }, }, { category: "product_version", name: "nss-myhostname-32bit-234-24.30.1.x86_64", product: { name: "nss-myhostname-32bit-234-24.30.1.x86_64", product_id: "nss-myhostname-32bit-234-24.30.1.x86_64", }, }, { category: "product_version", name: "nss-mymachines-234-24.30.1.x86_64", product: { name: "nss-mymachines-234-24.30.1.x86_64", product_id: "nss-mymachines-234-24.30.1.x86_64", }, }, { category: "product_version", name: "nss-mymachines-32bit-234-24.30.1.x86_64", product: { name: "nss-mymachines-32bit-234-24.30.1.x86_64", product_id: "nss-mymachines-32bit-234-24.30.1.x86_64", }, }, { category: "product_version", name: "nss-systemd-234-24.30.1.x86_64", product: { name: "nss-systemd-234-24.30.1.x86_64", product_id: "nss-systemd-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-234-24.30.1.x86_64", product: { name: "systemd-234-24.30.1.x86_64", product_id: "systemd-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-32bit-234-24.30.1.x86_64", product: { name: "systemd-32bit-234-24.30.1.x86_64", product_id: "systemd-32bit-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-container-234-24.30.1.x86_64", product: { name: "systemd-container-234-24.30.1.x86_64", product_id: "systemd-container-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-coredump-234-24.30.1.x86_64", product: { name: "systemd-coredump-234-24.30.1.x86_64", product_id: "systemd-coredump-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-devel-234-24.30.1.x86_64", product: { name: "systemd-devel-234-24.30.1.x86_64", product_id: "systemd-devel-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-logger-234-24.30.1.x86_64", product: { name: "systemd-logger-234-24.30.1.x86_64", product_id: "systemd-logger-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-mini-234-24.30.1.x86_64", product: { name: "systemd-mini-234-24.30.1.x86_64", product_id: "systemd-mini-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-mini-container-mini-234-24.30.1.x86_64", product: { name: "systemd-mini-container-mini-234-24.30.1.x86_64", product_id: "systemd-mini-container-mini-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-mini-coredump-mini-234-24.30.1.x86_64", product: { name: "systemd-mini-coredump-mini-234-24.30.1.x86_64", product_id: "systemd-mini-coredump-mini-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-mini-devel-234-24.30.1.x86_64", product: { name: "systemd-mini-devel-234-24.30.1.x86_64", product_id: "systemd-mini-devel-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-mini-sysvinit-234-24.30.1.x86_64", product: { name: "systemd-mini-sysvinit-234-24.30.1.x86_64", product_id: "systemd-mini-sysvinit-234-24.30.1.x86_64", }, }, { category: "product_version", name: "systemd-sysvinit-234-24.30.1.x86_64", product: { name: "systemd-sysvinit-234-24.30.1.x86_64", product_id: "systemd-sysvinit-234-24.30.1.x86_64", }, }, { category: "product_version", name: "udev-234-24.30.1.x86_64", product: { name: "udev-234-24.30.1.x86_64", product_id: "udev-234-24.30.1.x86_64", }, }, { category: "product_version", name: "udev-mini-234-24.30.1.x86_64", product: { name: "udev-mini-234-24.30.1.x86_64", product_id: "udev-mini-234-24.30.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15", product: { name: "SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "libsystemd0-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64", }, product_reference: "libsystemd0-234-24.30.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le", }, product_reference: "libsystemd0-234-24.30.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x", }, product_reference: "libsystemd0-234-24.30.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64", }, product_reference: "libsystemd0-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libsystemd0-32bit-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64", }, product_reference: "libsystemd0-32bit-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64", }, product_reference: "libudev-devel-234-24.30.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le", }, product_reference: "libudev-devel-234-24.30.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x", }, product_reference: "libudev-devel-234-24.30.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libudev-devel-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64", }, product_reference: "libudev-devel-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libudev1-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64", }, product_reference: "libudev1-234-24.30.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libudev1-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le", }, product_reference: "libudev1-234-24.30.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libudev1-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x", }, product_reference: "libudev1-234-24.30.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libudev1-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64", }, product_reference: "libudev1-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "libudev1-32bit-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64", }, product_reference: "libudev1-32bit-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64", }, product_reference: "systemd-234-24.30.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le", }, product_reference: "systemd-234-24.30.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x", }, product_reference: "systemd-234-24.30.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64", }, product_reference: "systemd-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-32bit-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64", }, product_reference: "systemd-32bit-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-bash-completion-234-24.30.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch", }, product_reference: "systemd-bash-completion-234-24.30.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-container-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64", }, product_reference: "systemd-container-234-24.30.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-container-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le", }, product_reference: "systemd-container-234-24.30.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-container-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x", }, product_reference: "systemd-container-234-24.30.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-container-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64", }, product_reference: "systemd-container-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-coredump-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64", }, product_reference: "systemd-coredump-234-24.30.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-coredump-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le", }, product_reference: "systemd-coredump-234-24.30.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-coredump-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x", }, product_reference: "systemd-coredump-234-24.30.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-coredump-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64", }, product_reference: "systemd-coredump-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64", }, product_reference: "systemd-devel-234-24.30.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le", }, product_reference: "systemd-devel-234-24.30.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x", }, product_reference: "systemd-devel-234-24.30.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-devel-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64", }, product_reference: "systemd-devel-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64", }, product_reference: "systemd-sysvinit-234-24.30.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le", }, product_reference: "systemd-sysvinit-234-24.30.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x", }, product_reference: "systemd-sysvinit-234-24.30.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "systemd-sysvinit-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64", }, product_reference: "systemd-sysvinit-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "udev-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64", }, product_reference: "udev-234-24.30.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "udev-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le", }, product_reference: "udev-234-24.30.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "udev-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x", }, product_reference: "udev-234-24.30.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, { category: "default_component_of", full_product_name: { name: "udev-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", product_id: "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64", }, product_reference: "udev-234-24.30.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15", }, ], }, vulnerabilities: [ { cve: "CVE-2019-3842", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3842", }, ], notes: [ { category: "general", text: "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3842", url: "https://www.suse.com/security/cve/CVE-2019-3842", }, { category: "external", summary: "SUSE Bug 1132348 for CVE-2019-3842", url: "https://bugzilla.suse.com/1132348", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T08:51:42Z", details: "moderate", }, ], title: "CVE-2019-3842", }, { cve: "CVE-2019-3843", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3843", }, ], notes: [ { category: "general", text: "It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3843", url: "https://www.suse.com/security/cve/CVE-2019-3843", }, { category: "external", summary: "SUSE Bug 1133506 for CVE-2019-3843", url: "https://bugzilla.suse.com/1133506", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T08:51:42Z", details: "moderate", }, ], title: "CVE-2019-3843", }, { cve: "CVE-2019-3844", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-3844", }, ], notes: [ { category: "general", text: "It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-3844", url: "https://www.suse.com/security/cve/CVE-2019-3844", }, { category: "external", summary: "SUSE Bug 1133509 for CVE-2019-3844", url: "https://bugzilla.suse.com/1133509", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T08:51:42Z", details: "moderate", }, ], title: "CVE-2019-3844", }, { cve: "CVE-2019-6454", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-6454", }, ], notes: [ { category: "general", text: "An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-6454", url: "https://www.suse.com/security/cve/CVE-2019-6454", }, { category: "external", summary: "SUSE Bug 1125352 for CVE-2019-6454", url: "https://bugzilla.suse.com/1125352", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2019-05-28T08:51:42Z", details: "important", }, ], title: "CVE-2019-6454", }, ], }
var-201904-0347
Vulnerability from variot
In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any". Systemd is a Linux-based system and service manager for Lennart Poettering software developers in Germany. The product is compatible with SysV and LSB startup scripts and provides a framework for representing dependencies between system services. A license and access control vulnerability exists in the systemdv242-rc4 release that stems from the lack of effective permissions and access control measures for network systems or products. An attacker could exploit this vulnerability to gain access to webmasters. Bugs fixed (https://bugzilla.redhat.com/):
1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: Red Hat OpenShift Container Storage 4.6.5 security and bug fix update Advisory ID: RHSA-2021:2479-01 Product: Red Hat OpenShift Container Storage Advisory URL: https://access.redhat.com/errata/RHSA-2021:2479 Issue date: 2021-06-17 CVE Names: CVE-2016-10228 CVE-2017-14502 CVE-2019-2708 CVE-2019-3842 CVE-2019-9169 CVE-2019-13012 CVE-2019-14866 CVE-2019-25013 CVE-2020-8231 CVE-2020-8284 CVE-2020-8285 CVE-2020-8286 CVE-2020-8927 CVE-2020-9948 CVE-2020-9951 CVE-2020-9983 CVE-2020-13434 CVE-2020-13543 CVE-2020-13584 CVE-2020-13776 CVE-2020-15358 CVE-2020-24977 CVE-2020-25659 CVE-2020-25678 CVE-2020-26116 CVE-2020-26137 CVE-2020-27618 CVE-2020-27619 CVE-2020-27783 CVE-2020-28196 CVE-2020-29361 CVE-2020-29362 CVE-2020-29363 CVE-2020-36242 CVE-2021-3139 CVE-2021-3177 CVE-2021-3326 CVE-2021-3449 CVE-2021-3450 CVE-2021-3528 CVE-2021-20305 CVE-2021-23239 CVE-2021-23240 CVE-2021-23336 ==================================================================== 1. Summary:
Updated images that fix one security issue and several bugs are now available for Red Hat OpenShift Container Storage 4.6.5 on Red Hat Enterprise Linux 8 from Red Hat Container Registry.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Description:
Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service with an S3 compatible API.
Security Fix(es):
- NooBaa: noobaa-operator leaking RPC AuthToken into log files (CVE-2021-3528)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
Currently, a newly restored PVC cannot be mounted if some of the OpenShift Container Platform nodes are running on a version of Red Hat Enterprise Linux which is less than 8.2, and the snapshot from which the PVC was restored is deleted. Workaround: Do not delete the snapshot from which the PVC was restored until the restored PVC is deleted. (BZ#1962483)
-
Previously, the default backingstore was not created on AWS S3 when OpenShift Container Storage was deployed, due to incorrect identification of AWS S3. With this update, the default backingstore gets created when OpenShift Container Storage is deployed on AWS S3. (BZ#1927307)
-
Previously, log messages were printed to the endpoint pod log even if the debug option was not set. With this update, the log messages are printed to the endpoint pod log only when the debug option is set. (BZ#1938106)
-
Previously, the PVCs could not be provisioned as the
rook-ceph-mds
did not register the pod IP on the monitor servers, and hence every mount on the filesystem timed out, resulting in CephFS volume provisioning failure. With this update, an argument--public-addr=podIP
is added to the MDS pod when the host network is not enabled, and hence the CephFS volume provisioning does not fail. (BZ#1949558) -
Previously, OpenShift Container Storage 4.2 clusters were not updated with the correct cache value, and hence MDSs in standby-replay might report an oversized cache, as rook did not apply the
mds_cache_memory_limit
argument during upgrades. With this update, themds_cache_memory_limit
argument is applied during upgrades and the mds daemon operates normally. (BZ#1951348) -
Previously, the coredumps were not generated in the correct location as rook was setting the config option
log_file
to an empty string since logging happened on stdout and not on the files, and hence Ceph read the value of thelog_file
to build the dump path. With this update, rook does not set thelog_file
and keeps Ceph's internal default, and hence the coredumps are generated in the correct location and are accessible under/var/log/ceph/
. (BZ#1938049) -
Previously, Ceph became inaccessible, as the mons lose quorum if a mon pod was drained while another mon was failing over. With this update, voluntary mon drains are prevented while a mon is failing over, and hence Ceph does not become inaccessible. (BZ#1946573)
-
Previously, the mon quorum was at risk, as the operator could erroneously remove the new mon if the operator was restarted during a mon failover. With this update, the operator completes the same mon failover after the operator is restarted, and hence the mon quorum is more reliable in the node drains and mon failover scenarios. (BZ#1959983)
All users of Red Hat OpenShift Container Storage are advised to pull these new images from the Red Hat Container Registry.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1938106 - [GSS][RFE]Reduce debug level for logs of Nooba Endpoint pod 1950915 - XSS Vulnerability with Noobaa version 5.5.0-3bacc6b 1951348 - [GSS][CephFS] health warning "MDS cache is too large (3GB/1GB); 0 inodes in use by clients, 0 stray files" for the standby-replay 1951600 - [4.6.z][Clone of BZ #1936545] setuid and setgid file bits are not retained after a OCS CephFS CSI restore 1955601 - CVE-2021-3528 NooBaa: noobaa-operator leaking RPC AuthToken into log files 1957189 - [Rebase] Use RHCS4.2z1 container image with OCS 4..6.5[may require doc update for external mode min supported RHCS version] 1959980 - When a node is being drained, increase the mon failover timeout to prevent unnecessary mon failover 1959983 - [GSS][mon] rook-operator scales mons to 4 after healthCheck timeout 1962483 - [RHEL7][RBD][4.6.z clone] FailedMount error when using restored PVC on app pod
- References:
https://access.redhat.com/security/cve/CVE-2016-10228 https://access.redhat.com/security/cve/CVE-2017-14502 https://access.redhat.com/security/cve/CVE-2019-2708 https://access.redhat.com/security/cve/CVE-2019-3842 https://access.redhat.com/security/cve/CVE-2019-9169 https://access.redhat.com/security/cve/CVE-2019-13012 https://access.redhat.com/security/cve/CVE-2019-14866 https://access.redhat.com/security/cve/CVE-2019-25013 https://access.redhat.com/security/cve/CVE-2020-8231 https://access.redhat.com/security/cve/CVE-2020-8284 https://access.redhat.com/security/cve/CVE-2020-8285 https://access.redhat.com/security/cve/CVE-2020-8286 https://access.redhat.com/security/cve/CVE-2020-8927 https://access.redhat.com/security/cve/CVE-2020-9948 https://access.redhat.com/security/cve/CVE-2020-9951 https://access.redhat.com/security/cve/CVE-2020-9983 https://access.redhat.com/security/cve/CVE-2020-13434 https://access.redhat.com/security/cve/CVE-2020-13543 https://access.redhat.com/security/cve/CVE-2020-13584 https://access.redhat.com/security/cve/CVE-2020-13776 https://access.redhat.com/security/cve/CVE-2020-15358 https://access.redhat.com/security/cve/CVE-2020-24977 https://access.redhat.com/security/cve/CVE-2020-25659 https://access.redhat.com/security/cve/CVE-2020-25678 https://access.redhat.com/security/cve/CVE-2020-26116 https://access.redhat.com/security/cve/CVE-2020-26137 https://access.redhat.com/security/cve/CVE-2020-27618 https://access.redhat.com/security/cve/CVE-2020-27619 https://access.redhat.com/security/cve/CVE-2020-27783 https://access.redhat.com/security/cve/CVE-2020-28196 https://access.redhat.com/security/cve/CVE-2020-29361 https://access.redhat.com/security/cve/CVE-2020-29362 https://access.redhat.com/security/cve/CVE-2020-29363 https://access.redhat.com/security/cve/CVE-2020-36242 https://access.redhat.com/security/cve/CVE-2021-3139 https://access.redhat.com/security/cve/CVE-2021-3177 https://access.redhat.com/security/cve/CVE-2021-3326 https://access.redhat.com/security/cve/CVE-2021-3449 https://access.redhat.com/security/cve/CVE-2021-3450 https://access.redhat.com/security/cve/CVE-2021-3528 https://access.redhat.com/security/cve/CVE-2021-20305 https://access.redhat.com/security/cve/CVE-2021-23239 https://access.redhat.com/security/cve/CVE-2021-23240 https://access.redhat.com/security/cve/CVE-2021-23336 https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYMtu/9zjgjWX9erEAQh6fhAAm9UPxF0e8ubzCEae+bkQAduwCkzpQ0ND Q1/UcDAAc4ueEhBrwXPhOLrgfBj+VG+QA19YZcNPzbW7I48RGjCm5WccnUyEbFAo FKTspCZW7FkXKBU15u58c/sFCGa4/Yuu+IpqCMuZ6lR2g9WHIBKdVtaB4y59AyfS v59cAorqZ3AoTX4lVys6HfDGySQWlg5P8t6ST72cUJjESi6U0HV00P7ECU2SFxCF HXA4gbXbZ1EPb/1+UkRRnXemJuT8SaRFRTrzj9woTrVAGQFvn+yjxLbZxVZb0WDd 6QeNpiJNICfL+/ExvEmGQucf7NcekYPWud11pnRUfQ+Uqsj+I7YoaepXAAolLzvN kAVVpFNsWADOVz7BrfSKoo4b38UCFOEUSd2d1ijCNE96Q9XyNUpn+kZqz0/wpBQC L+E5N9kEuaLyDBoI0wJAfoqU1NY4Cvl6lIMDgHUv2CE10zxhFwHCDulAfcQgxNQG sIbpSgSegq9HfZSDxa6Rtrox1I7oGhnBy10sIwUUH1+fxAusUk+Xrxf8hUv8KgDz V144yrGwN/6KVxh74A60bJX3ai12l6fC8bkmsxg5K1r/Dk4tUkQeXNdBbaK/rEKO AQs7YDab/0VA2qKtXDRkbnzqBRSbamDNOO/jd28nGMoclaIRHCzQgJRFv6Qb6dwT RCrstqAM5QQ=DHD0 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce .
Bug Fix(es):
-
WMCO patch pub-key-hash annotation to Linux node (BZ#1945248)
-
LoadBalancer Service type with invalid external loadbalancer IP breaks the datapath (BZ#1952917)
-
Telemetry info not completely available to identify windows nodes (BZ#1955319)
-
WMCO incorrectly shows node as ready after a failed configuration (BZ#1956412)
-
kube-proxy service terminated unexpectedly after recreated LB service (BZ#1963263)
-
Solution:
For Windows Machine Config Operator upgrades, see the following documentation:
https://docs.openshift.com/container-platform/4.7/windows_containers/window s-node-upgrades.html
- Bugs fixed (https://bugzilla.redhat.com/):
1945248 - WMCO patch pub-key-hash annotation to Linux node 1946538 - CVE-2021-25736 kubernetes: LoadBalancer Service type don't create a HNS policy for empty or invalid external loadbalancer IP, what could lead to MITM 1952917 - LoadBalancer Service type with invalid external loadbalancer IP breaks the datapath 1955319 - Telemetry info not completely available to identify windows nodes 1956412 - WMCO incorrectly shows node as ready after a failed configuration 1963263 - kube-proxy service terminated unexpectedly after recreated LB service
- Bugs fixed (https://bugzilla.redhat.com/):
1897635 - CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers 1918750 - CVE-2021-3114 golang: crypto/elliptic: incorrect operations on the P-224 curve 1928172 - CVE-2020-13949 libthrift: potential DoS when processing untrusted payloads 1928937 - CVE-2021-23337 nodejs-lodash: command injection via template 1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions
- Bugs fixed (https://bugzilla.redhat.com/):
1937901 - CVE-2021-27918 golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader 1958341 - CVE-2021-31525 golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header 1965503 - CVE-2021-33196 golang: archive/zip: Malformed archive may cause panic or memory exhaustion 1971445 - Release of OpenShift Serverless Serving 1.16.0 1971448 - Release of OpenShift Serverless Eventing 1.16.0
- See the following advisory for the RPM packages for this release:
https://access.redhat.com/errata/RHSA-2021:2122
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html
This update fixes the following bug among others:
- Previously, resources for the ClusterOperator were being created early in the update process, which led to update failures when the ClusterOperator had no status condition while Operators were updating. This bug fix changes the timing of when these resources are created. As a result, updates can take place without errors. (BZ#1959238)
Security Fix(es):
- gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)
You may download the oc tool and use it to inspect release image metadata as follows:
(For x86_64 architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.13-x86_64
The image digest is sha256:783a2c963f35ccab38e82e6a8c7fa954c3a4551e07d2f43c06098828dd986ed4
(For s390x architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.13-s390x
The image digest is sha256:4cf44e68413acad063203e1ee8982fd01d8b9c1f8643a5b31cd7ff341b3199cd
(For ppc64le architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.13-ppc64le
The image digest is sha256:d47ce972f87f14f1f3c5d50428d2255d1256dae3f45c938ace88547478643e36
All OpenShift Container Platform 4.7 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor
- Solution:
For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html
Details on how to access this content are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -cli.html
- Bugs fixed (https://bugzilla.redhat.com/):
1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 1923268 - [Assisted-4.7] [Staging] Using two both spelling "canceled" "cancelled" 1947216 - [AWS] Missing iam:ListAttachedRolePolicies permission in permissions.go 1953963 - Enable/Disable host operations returns cluster resource with incomplete hosts list 1957749 - ovn-kubernetes pod should have CPU and memory requests set but not limits 1959238 - CVO creating cloud-controller-manager too early causing upgrade failures 1960103 - SR-IOV obliviously reboot the node 1961941 - Local Storage Operator using LocalVolume CR fails to create PV's when backend storage failure is simulated 1962302 - packageserver clusteroperator does not set reason or message for Available condition 1962312 - Deployment considered unhealthy despite being available and at latest generation 1962435 - Public DNS records were not deleted when destroying a cluster which is using byo private hosted zone 1963115 - Test verify /run filesystem contents failing
- ========================================================================== Ubuntu Security Notice USN-3938-1 April 08, 2019
systemd vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
The systemd PAM module could be used to gain additional PolicyKit privileges.
Software Description: - systemd: system and service manager
Details:
Jann Horn discovered that pam_systemd created logind sessions using some parameters from the environment. A local attacker could exploit this in order to spoof the active session and gain additional PolicyKit privileges.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.10: libpam-systemd 239-7ubuntu10.12
Ubuntu 18.04 LTS: libpam-systemd 237-3ubuntu10.19
Ubuntu 16.04 LTS: libpam-systemd 229-4ubuntu21.21
Ubuntu 14.04 LTS: libpam-systemd 204-5ubuntu20.31
In general, a standard system update will make all the necessary changes. Summary:
Release of components for the Service Telemetry Framework
- Description:
Service Telemetry Framework (STF) provides automated collection of measurements and data from remote clients, such as Red Hat OpenStack Platform or third-party nodes.
Bug fixes:
-
STF 1.3.3 now supports OpenShift Container Platform 4.8 as an installation platform. (BZ#2013268)
-
With this update, the servicetelemetrys.infra.watch CRD has a validation that limits the clouds[].name to 10 characters and alphanumeric to avoid issues with extra characters in the cloud name and names being too long. (BZ#2011603)
-
Previously, when you installed STF without having Elastic Cloud on Kubernetes (ECK) Operator installed, the following error message was returned: "Failed to find exact match for elasticsearch.k8s.elastic.co/v1beta1.Elasticsearch". The error was as a result of Service Telemetry Operator trying to look up information from a non-existent API interface.
With this update, the Service Telemetry Operator verifies that the API exists before it attempts to make requests to the API interface that is provided by ECK. (BZ#1959166)
- Dockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally. Bugs fixed (https://bugzilla.redhat.com/):
1959166 - Service Telemetry Operator can error out if ElasticSearch (ECK) CRD is not installed 1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic 2011603 - STF multi-cloud setup misinterprets name if a "-" is being used 2013268 - [RFE] Support STF 1.3 on OCP 4.8
5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201904-0347", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "linux", scope: "eq", trust: 1, vendor: "debian", version: "8.0", }, { model: "fedora", scope: "eq", trust: 1, vendor: "fedoraproject", version: "30", }, { model: "systemd", scope: "eq", trust: 1, vendor: "systemd", version: "242", }, { model: "enterprise linux", scope: "eq", trust: 1, vendor: "redhat", version: "7.0", }, { model: "systemd", scope: "lte", trust: 1, vendor: "systemd", version: "241", }, { model: "v242-rc4", scope: null, trust: 0.6, vendor: "systemd", version: null, }, ], sources: [ { db: "CNVD", id: "CNVD-2019-14937", }, { db: "NVD", id: "CVE-2019-3842", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Red Hat", sources: [ { db: "PACKETSTORM", id: "162837", }, { db: "PACKETSTORM", id: "163209", }, { db: "PACKETSTORM", id: "163257", }, { db: "PACKETSTORM", id: "163276", }, { db: "PACKETSTORM", id: "163496", }, { db: "PACKETSTORM", id: "162877", }, { db: "PACKETSTORM", id: "164901", }, ], trust: 0.7, }, cve: "CVE-2019-3842", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", author: "nvd@nist.gov", availabilityImpact: "PARTIAL", baseScore: 4.4, confidentialityImpact: "PARTIAL", exploitabilityScore: 3.4, id: "CVE-2019-3842", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 1.1, vectorString: "AV:L/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", author: "CNVD", availabilityImpact: "PARTIAL", baseScore: 4.4, confidentialityImpact: "PARTIAL", exploitabilityScore: 3.4, id: "CNVD-2019-14937", impactScore: 6.4, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 0.6, vectorString: "AV:L/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "HIGH", attackVector: "LOCAL", author: "nvd@nist.gov", availabilityImpact: "HIGH", baseScore: 7, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1, id: "CVE-2019-3842", impactScore: 5.9, integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, { attackComplexity: "HIGH", attackVector: "LOCAL", author: "secalert@redhat.com", availabilityImpact: "LOW", baseScore: 4.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", exploitabilityScore: 1, id: "CVE-2019-3842", impactScore: 3.4, integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, ], severity: [ { author: "nvd@nist.gov", id: "CVE-2019-3842", trust: 1, value: "HIGH", }, { author: "secalert@redhat.com", id: "CVE-2019-3842", trust: 1, value: "MEDIUM", }, { author: "CNVD", id: "CNVD-2019-14937", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-201904-418", trust: 0.6, value: "HIGH", }, { author: "VULMON", id: "CVE-2019-3842", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2019-14937", }, { db: "VULMON", id: "CVE-2019-3842", }, { db: "CNNVD", id: "CNNVD-201904-418", }, { db: "NVD", id: "CVE-2019-3842", }, { db: "NVD", id: "CVE-2019-3842", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\". Systemd is a Linux-based system and service manager for Lennart Poettering software developers in Germany. The product is compatible with SysV and LSB startup scripts and provides a framework for representing dependencies between system services. A license and access control vulnerability exists in the systemdv242-rc4 release that stems from the lack of effective permissions and access control measures for network systems or products. An attacker could exploit this vulnerability to gain access to webmasters. Bugs fixed (https://bugzilla.redhat.com/):\n\n1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation\n\n5. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Moderate: Red Hat OpenShift Container Storage 4.6.5 security and bug fix update\nAdvisory ID: RHSA-2021:2479-01\nProduct: Red Hat OpenShift Container Storage\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:2479\nIssue date: 2021-06-17\nCVE Names: CVE-2016-10228 CVE-2017-14502 CVE-2019-2708\n CVE-2019-3842 CVE-2019-9169 CVE-2019-13012\n CVE-2019-14866 CVE-2019-25013 CVE-2020-8231\n CVE-2020-8284 CVE-2020-8285 CVE-2020-8286\n CVE-2020-8927 CVE-2020-9948 CVE-2020-9951\n CVE-2020-9983 CVE-2020-13434 CVE-2020-13543\n CVE-2020-13584 CVE-2020-13776 CVE-2020-15358\n CVE-2020-24977 CVE-2020-25659 CVE-2020-25678\n CVE-2020-26116 CVE-2020-26137 CVE-2020-27618\n CVE-2020-27619 CVE-2020-27783 CVE-2020-28196\n CVE-2020-29361 CVE-2020-29362 CVE-2020-29363\n CVE-2020-36242 CVE-2021-3139 CVE-2021-3177\n CVE-2021-3326 CVE-2021-3449 CVE-2021-3450\n CVE-2021-3528 CVE-2021-20305 CVE-2021-23239\n CVE-2021-23240 CVE-2021-23336\n====================================================================\n1. Summary:\n\nUpdated images that fix one security issue and several bugs are now\navailable for Red Hat OpenShift Container Storage 4.6.5 on Red Hat\nEnterprise Linux 8 from Red Hat Container Registry. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Description:\n\nRed Hat OpenShift Container Storage is software-defined storage integrated\nwith and optimized for the Red Hat OpenShift Container Platform. Red Hat\nOpenShift Container Storage is a highly scalable, production-grade\npersistent storage for stateful applications running in the Red Hat\nOpenShift Container Platform. In addition to persistent storage, Red Hat\nOpenShift Container Storage provisions a multicloud data management service\nwith an S3 compatible API. \n\nSecurity Fix(es):\n\n* NooBaa: noobaa-operator leaking RPC AuthToken into log files\n(CVE-2021-3528)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. \n\nBug Fix(es):\n\n* Currently, a newly restored PVC cannot be mounted if some of the\nOpenShift Container Platform nodes are running on a version of Red Hat\nEnterprise Linux which is less than 8.2, and the snapshot from which the\nPVC was restored is deleted. \nWorkaround: Do not delete the snapshot from which the PVC was restored\nuntil the restored PVC is deleted. (BZ#1962483)\n\n* Previously, the default backingstore was not created on AWS S3 when\nOpenShift Container Storage was deployed, due to incorrect identification\nof AWS S3. With this update, the default backingstore gets created when\nOpenShift Container Storage is deployed on AWS S3. (BZ#1927307)\n\n* Previously, log messages were printed to the endpoint pod log even if the\ndebug option was not set. With this update, the log messages are printed to\nthe endpoint pod log only when the debug option is set. (BZ#1938106)\n\n* Previously, the PVCs could not be provisioned as the `rook-ceph-mds` did\nnot register the pod IP on the monitor servers, and hence every mount on\nthe filesystem timed out, resulting in CephFS volume provisioning failure. \nWith this update, an argument `--public-addr=podIP` is added to the MDS pod\nwhen the host network is not enabled, and hence the CephFS volume\nprovisioning does not fail. (BZ#1949558)\n\n* Previously, OpenShift Container Storage 4.2 clusters were not updated\nwith the correct cache value, and hence MDSs in standby-replay might report\nan oversized cache, as rook did not apply the `mds_cache_memory_limit`\nargument during upgrades. With this update, the `mds_cache_memory_limit`\nargument is applied during upgrades and the mds daemon operates normally. \n(BZ#1951348)\n\n* Previously, the coredumps were not generated in the correct location as\nrook was setting the config option `log_file` to an empty string since\nlogging happened on stdout and not on the files, and hence Ceph read the\nvalue of the `log_file` to build the dump path. With this update, rook does\nnot set the `log_file` and keeps Ceph's internal default, and hence the\ncoredumps are generated in the correct location and are accessible under\n`/var/log/ceph/`. (BZ#1938049)\n\n* Previously, Ceph became inaccessible, as the mons lose quorum if a mon\npod was drained while another mon was failing over. With this update,\nvoluntary mon drains are prevented while a mon is failing over, and hence\nCeph does not become inaccessible. (BZ#1946573)\n\n* Previously, the mon quorum was at risk, as the operator could erroneously\nremove the new mon if the operator was restarted during a mon failover. \nWith this update, the operator completes the same mon failover after the\noperator is restarted, and hence the mon quorum is more reliable in the\nnode drains and mon failover scenarios. (BZ#1959983)\n\nAll users of Red Hat OpenShift Container Storage are advised to pull these\nnew images from the Red Hat Container Registry. \n\n3. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1938106 - [GSS][RFE]Reduce debug level for logs of Nooba Endpoint pod\n1950915 - XSS Vulnerability with Noobaa version 5.5.0-3bacc6b\n1951348 - [GSS][CephFS] health warning \"MDS cache is too large (3GB/1GB); 0 inodes in use by clients, 0 stray files\" for the standby-replay\n1951600 - [4.6.z][Clone of BZ #1936545] setuid and setgid file bits are not retained after a OCS CephFS CSI restore\n1955601 - CVE-2021-3528 NooBaa: noobaa-operator leaking RPC AuthToken into log files\n1957189 - [Rebase] Use RHCS4.2z1 container image with OCS 4..6.5[may require doc update for external mode min supported RHCS version]\n1959980 - When a node is being drained, increase the mon failover timeout to prevent unnecessary mon failover\n1959983 - [GSS][mon] rook-operator scales mons to 4 after healthCheck timeout\n1962483 - [RHEL7][RBD][4.6.z clone] FailedMount error when using restored PVC on app pod\n\n5. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-10228\nhttps://access.redhat.com/security/cve/CVE-2017-14502\nhttps://access.redhat.com/security/cve/CVE-2019-2708\nhttps://access.redhat.com/security/cve/CVE-2019-3842\nhttps://access.redhat.com/security/cve/CVE-2019-9169\nhttps://access.redhat.com/security/cve/CVE-2019-13012\nhttps://access.redhat.com/security/cve/CVE-2019-14866\nhttps://access.redhat.com/security/cve/CVE-2019-25013\nhttps://access.redhat.com/security/cve/CVE-2020-8231\nhttps://access.redhat.com/security/cve/CVE-2020-8284\nhttps://access.redhat.com/security/cve/CVE-2020-8285\nhttps://access.redhat.com/security/cve/CVE-2020-8286\nhttps://access.redhat.com/security/cve/CVE-2020-8927\nhttps://access.redhat.com/security/cve/CVE-2020-9948\nhttps://access.redhat.com/security/cve/CVE-2020-9951\nhttps://access.redhat.com/security/cve/CVE-2020-9983\nhttps://access.redhat.com/security/cve/CVE-2020-13434\nhttps://access.redhat.com/security/cve/CVE-2020-13543\nhttps://access.redhat.com/security/cve/CVE-2020-13584\nhttps://access.redhat.com/security/cve/CVE-2020-13776\nhttps://access.redhat.com/security/cve/CVE-2020-15358\nhttps://access.redhat.com/security/cve/CVE-2020-24977\nhttps://access.redhat.com/security/cve/CVE-2020-25659\nhttps://access.redhat.com/security/cve/CVE-2020-25678\nhttps://access.redhat.com/security/cve/CVE-2020-26116\nhttps://access.redhat.com/security/cve/CVE-2020-26137\nhttps://access.redhat.com/security/cve/CVE-2020-27618\nhttps://access.redhat.com/security/cve/CVE-2020-27619\nhttps://access.redhat.com/security/cve/CVE-2020-27783\nhttps://access.redhat.com/security/cve/CVE-2020-28196\nhttps://access.redhat.com/security/cve/CVE-2020-29361\nhttps://access.redhat.com/security/cve/CVE-2020-29362\nhttps://access.redhat.com/security/cve/CVE-2020-29363\nhttps://access.redhat.com/security/cve/CVE-2020-36242\nhttps://access.redhat.com/security/cve/CVE-2021-3139\nhttps://access.redhat.com/security/cve/CVE-2021-3177\nhttps://access.redhat.com/security/cve/CVE-2021-3326\nhttps://access.redhat.com/security/cve/CVE-2021-3449\nhttps://access.redhat.com/security/cve/CVE-2021-3450\nhttps://access.redhat.com/security/cve/CVE-2021-3528\nhttps://access.redhat.com/security/cve/CVE-2021-20305\nhttps://access.redhat.com/security/cve/CVE-2021-23239\nhttps://access.redhat.com/security/cve/CVE-2021-23240\nhttps://access.redhat.com/security/cve/CVE-2021-23336\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n6. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nRCrstqAM5QQ=DHD0\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nBug Fix(es):\n\n* WMCO patch pub-key-hash annotation to Linux node (BZ#1945248)\n\n* LoadBalancer Service type with invalid external loadbalancer IP breaks\nthe datapath (BZ#1952917)\n\n* Telemetry info not completely available to identify windows nodes\n(BZ#1955319)\n\n* WMCO incorrectly shows node as ready after a failed configuration\n(BZ#1956412)\n\n* kube-proxy service terminated unexpectedly after recreated LB service\n(BZ#1963263)\n\n3. Solution:\n\nFor Windows Machine Config Operator upgrades, see the following\ndocumentation:\n\nhttps://docs.openshift.com/container-platform/4.7/windows_containers/window\ns-node-upgrades.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1945248 - WMCO patch pub-key-hash annotation to Linux node\n1946538 - CVE-2021-25736 kubernetes: LoadBalancer Service type don't create a HNS policy for empty or invalid external loadbalancer IP, what could lead to MITM\n1952917 - LoadBalancer Service type with invalid external loadbalancer IP breaks the datapath\n1955319 - Telemetry info not completely available to identify windows nodes\n1956412 - WMCO incorrectly shows node as ready after a failed configuration\n1963263 - kube-proxy service terminated unexpectedly after recreated LB service\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1897635 - CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers\n1918750 - CVE-2021-3114 golang: crypto/elliptic: incorrect operations on the P-224 curve\n1928172 - CVE-2020-13949 libthrift: potential DoS when processing untrusted payloads\n1928937 - CVE-2021-23337 nodejs-lodash: command injection via template\n1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1937901 - CVE-2021-27918 golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader\n1958341 - CVE-2021-31525 golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header\n1965503 - CVE-2021-33196 golang: archive/zip: Malformed archive may cause panic or memory exhaustion\n1971445 - Release of OpenShift Serverless Serving 1.16.0\n1971448 - Release of OpenShift Serverless Eventing 1.16.0\n\n5. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHSA-2021:2122\n\nSpace precludes documenting all of the container images in this advisory. \nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel\nease-notes.html\n\nThis update fixes the following bug among others:\n\n* Previously, resources for the ClusterOperator were being created early in\nthe update process, which led to update failures when the ClusterOperator\nhad no status condition while Operators were updating. This bug fix changes\nthe timing of when these resources are created. As a result, updates can\ntake place without errors. (BZ#1959238)\n\nSecurity Fix(es):\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index\nvalidation (CVE-2021-3121)\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n(For x86_64 architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.13-x86_64\n\nThe image digest is\nsha256:783a2c963f35ccab38e82e6a8c7fa954c3a4551e07d2f43c06098828dd986ed4\n\n(For s390x architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.13-s390x\n\nThe image digest is\nsha256:4cf44e68413acad063203e1ee8982fd01d8b9c1f8643a5b31cd7ff341b3199cd\n\n(For ppc64le architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.13-ppc64le\n\nThe image digest is\nsha256:d47ce972f87f14f1f3c5d50428d2255d1256dae3f45c938ace88547478643e36\n\nAll OpenShift Container Platform 4.7 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n- -between-minor.html#understanding-upgrade-channels_updating-cluster-between\n- -minor\n\n3. Solution:\n\nFor OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel\nease-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n- -cli.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation\n1923268 - [Assisted-4.7] [Staging] Using two both spelling \"canceled\" \"cancelled\"\n1947216 - [AWS] Missing iam:ListAttachedRolePolicies permission in permissions.go\n1953963 - Enable/Disable host operations returns cluster resource with incomplete hosts list\n1957749 - ovn-kubernetes pod should have CPU and memory requests set but not limits\n1959238 - CVO creating cloud-controller-manager too early causing upgrade failures\n1960103 - SR-IOV obliviously reboot the node\n1961941 - Local Storage Operator using LocalVolume CR fails to create PV's when backend storage failure is simulated\n1962302 - packageserver clusteroperator does not set reason or message for Available condition\n1962312 - Deployment considered unhealthy despite being available and at latest generation\n1962435 - Public DNS records were not deleted when destroying a cluster which is using byo private hosted zone\n1963115 - Test verify /run filesystem contents failing\n\n5. ==========================================================================\nUbuntu Security Notice USN-3938-1\nApril 08, 2019\n\nsystemd vulnerability\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 18.10\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 LTS\n\nSummary:\n\nThe systemd PAM module could be used to gain additional PolicyKit\nprivileges. \n\nSoftware Description:\n- systemd: system and service manager\n\nDetails:\n\nJann Horn discovered that pam_systemd created logind sessions using some\nparameters from the environment. A local attacker could exploit this in\norder to spoof the active session and gain additional PolicyKit\nprivileges. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 18.10:\n libpam-systemd 239-7ubuntu10.12\n\nUbuntu 18.04 LTS:\n libpam-systemd 237-3ubuntu10.19\n\nUbuntu 16.04 LTS:\n libpam-systemd 229-4ubuntu21.21\n\nUbuntu 14.04 LTS:\n libpam-systemd 204-5ubuntu20.31\n\nIn general, a standard system update will make all the necessary changes. Summary:\n\nRelease of components for the Service Telemetry Framework\n\n2. Description:\n\nService Telemetry Framework (STF) provides automated collection of\nmeasurements and data from remote clients, such as Red Hat OpenStack\nPlatform or third-party nodes. \n\nBug fixes:\n\n* STF 1.3.3 now supports OpenShift Container Platform 4.8 as an\ninstallation platform. (BZ#2013268)\n\n* With this update, the servicetelemetrys.infra.watch CRD has a validation\nthat limits the clouds[].name to 10 characters and alphanumeric to avoid\nissues with extra characters in the cloud name and names being too long. \n(BZ#2011603)\n\n* Previously, when you installed STF without having Elastic Cloud on\nKubernetes (ECK) Operator installed, the following error message was\nreturned: \"Failed to find exact match for\nelasticsearch.k8s.elastic.co/v1beta1.Elasticsearch\". The error was as a\nresult of Service Telemetry Operator trying to look up information from a\nnon-existent API interface. \n\nWith this update, the Service Telemetry Operator verifies that the API\nexists before it attempts to make requests to the API interface that is\nprovided by ECK. (BZ#1959166)\n\n3. \nDockerfiles and scripts should be amended either to refer to this new image\nspecifically, or to the latest image generally. Bugs fixed (https://bugzilla.redhat.com/):\n\n1959166 - Service Telemetry Operator can error out if ElasticSearch (ECK) CRD is not installed\n1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic\n2011603 - STF multi-cloud setup misinterprets name if a \"-\" is being used\n2013268 - [RFE] Support STF 1.3 on OCP 4.8\n\n5", sources: [ { db: "NVD", id: "CVE-2019-3842", }, { db: "CNVD", id: "CNVD-2019-14937", }, { db: "VULMON", id: "CVE-2019-3842", }, { db: "PACKETSTORM", id: "162837", }, { db: "PACKETSTORM", id: "163209", }, { db: "PACKETSTORM", id: "163257", }, { db: "PACKETSTORM", id: "163276", }, { db: "PACKETSTORM", id: "163496", }, { db: "PACKETSTORM", id: "162877", }, { db: "PACKETSTORM", id: "152442", }, { db: "PACKETSTORM", id: "164901", }, ], trust: 2.25, }, exploit_availability: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { reference: "https://vulmon.com/exploitdetails?qidtp=exploitdb&qid=46743", trust: 0.1, type: "exploit", }, ], sources: [ { db: "VULMON", id: "CVE-2019-3842", }, ], }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2019-3842", trust: 3.1, }, { db: "EXPLOIT-DB", id: "46743", trust: 1.7, }, { db: "PACKETSTORM", id: "152610", trust: 1.7, }, { db: "PACKETSTORM", id: "162837", trust: 0.7, }, { db: "PACKETSTORM", id: "163276", trust: 0.7, }, { db: "PACKETSTORM", id: "163496", trust: 0.7, }, { db: "PACKETSTORM", id: "162877", trust: 0.7, }, { db: "PACKETSTORM", id: "164901", trust: 0.7, }, { db: "CNVD", id: "CNVD-2019-14937", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2021.1820", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2021.2180", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2021.2365", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2021.1866", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2021.1687", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2021.4058", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2021.2228", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2021.3471", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2019.1219", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2019.1185", trust: 0.6, }, { db: "AUSCERT", id: "ESB-2021.3848", trust: 0.6, }, { db: "PACKETSTORM", id: "162627", trust: 0.6, }, { db: "PACKETSTORM", id: "163267", trust: 0.6, }, { db: "PACKETSTORM", id: "164553", trust: 0.6, }, { db: "PACKETSTORM", id: "152445", trust: 0.6, }, { db: "CS-HELP", id: "SB2021062315", trust: 0.6, }, { db: "CS-HELP", id: "SB2021062703", trust: 0.6, }, { db: "CS-HELP", id: "SB2021102006", trust: 0.6, }, { db: "CS-HELP", id: "SB2021052027", trust: 0.6, }, { db: "CS-HELP", id: "SB2021092220", trust: 0.6, }, { db: "CS-HELP", id: "SB2021071516", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-201904-418", trust: 0.6, }, { db: "VULMON", id: "CVE-2019-3842", trust: 0.1, }, { db: "PACKETSTORM", id: "163209", trust: 0.1, }, { db: "PACKETSTORM", id: "163257", trust: 0.1, }, { db: "PACKETSTORM", id: "152442", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2019-14937", }, { db: "VULMON", id: "CVE-2019-3842", }, { db: "PACKETSTORM", id: "162837", }, { db: "PACKETSTORM", id: "163209", }, { db: "PACKETSTORM", id: "163257", }, { db: "PACKETSTORM", id: "163276", }, { db: "PACKETSTORM", id: "163496", }, { db: "PACKETSTORM", id: "162877", }, { db: "PACKETSTORM", id: "152442", }, { db: "PACKETSTORM", id: "164901", }, { db: "CNNVD", id: "CNNVD-201904-418", }, { db: "NVD", id: "CVE-2019-3842", }, ], }, id: "VAR-201904-0347", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2019-14937", }, ], trust: 1.6, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2019-14937", }, ], }, last_update_date: "2024-11-29T20:55:27.287000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Patch for systemd permission and access control issue vulnerabilities", trust: 0.6, url: "https://www.cnvd.org.cn/patchInfo/show/161823", }, { title: "systemd Security vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=91247", }, { title: "Ubuntu Security Notice: systemd vulnerability", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3938-1", }, { title: "Debian Security Advisories: DSA-4428-1 systemd -- security update", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=5c365eb29a9f32b7a81ec971ccdd9c30", }, { title: "Amazon Linux 2: ALAS2-2022-1854", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2022-1854", }, { title: "IBM: Security Bulletin: Multiple vulnerabilities affect IBM Cloud Object Storage Systems (February 2020v1)", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=979e60202a29c3c55731e37f8ddc5a3b", }, { title: "IBM: IBM Security Bulletin: Vyatta 5600 vRouter Software Patches – Releases 1801-w and 1801-y", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog&qid=bf3f2299a8658b7cd3984c40e7060666", }, { title: "", trust: 0.1, url: "https://github.com/vincent-deng/veracode-container-security-finding-parser ", }, ], sources: [ { db: "CNVD", id: "CNVD-2019-14937", }, { db: "VULMON", id: "CVE-2019-3842", }, { db: "CNNVD", id: "CNNVD-201904-418", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-285", trust: 1, }, { problemtype: "CWE-863", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2019-3842", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.9, url: "http://packetstormsecurity.com/files/152610/systemd-seat-verification-active-session-spoofing.html", }, { trust: 2, url: "https://nvd.nist.gov/vuln/detail/cve-2019-3842", }, { trust: 1.7, url: "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2019-3842", }, { trust: 1.7, url: "https://www.exploit-db.com/exploits/46743/", }, { trust: 1.7, url: "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html", }, { trust: 1.7, url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html", }, { trust: 1.1, url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/str36rje4zziormdxrervbhmprnrthac/", }, { trust: 1.1, url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3cissues.bookkeeper.apache.org%3e", }, { trust: 1.1, url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3cissues.bookkeeper.apache.org%3e", }, { trust: 0.7, url: "https://www.exploit-db.com/exploits/46743", }, { trust: 0.7, url: "https://access.redhat.com/security/cve/cve-2019-3842", }, { trust: 0.7, url: "https://access.redhat.com/security/cve/cve-2020-13776", }, { trust: 0.7, url: "https://listman.redhat.com/mailman/listinfo/rhsa-announce", }, { trust: 0.7, url: "https://bugzilla.redhat.com/):", }, { trust: 0.7, url: "https://access.redhat.com/security/team/contact/", }, { trust: 0.7, url: "https://access.redhat.com/security/updates/classification/#moderate", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2020-8286", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2020-28196", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2020-15358", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2020-13434", }, { trust: 0.6, url: "https://nvd.nist.gov/vuln/detail/cve-2020-13776", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2020-24977", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2020-8231", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2020-29362", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2020-8285", }, { trust: 0.6, url: "https://nvd.nist.gov/vuln/detail/cve-2016-10228", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2019-9169", }, { trust: 0.6, url: "https://nvd.nist.gov/vuln/detail/cve-2019-25013", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2020-29361", }, { trust: 0.6, url: "https://nvd.nist.gov/vuln/detail/cve-2019-9169", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2021-3326", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2019-25013", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2019-2708", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2020-8927", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2020-29363", }, { trust: 0.6, url: "https://nvd.nist.gov/vuln/detail/cve-2019-2708", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2016-10228", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2020-8284", }, { trust: 0.6, url: "https://access.redhat.com/security/cve/cve-2020-27618", }, { trust: 0.6, url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/str36rje4zziormdxrervbhmprnrthac/", }, { trust: 0.6, url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3cissues.bookkeeper.apache.org%3e", }, { trust: 0.6, url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3cissues.bookkeeper.apache.org%3e", }, { trust: 0.6, url: "http://www.debian.org/security/2019/dsa-4428", }, { trust: 0.6, url: "https://www.suse.com/support/update/announcement/2019/suse-su-20191364-2.html", }, { trust: 0.6, url: "http://www.ubuntu.com/usn/usn-3938-1", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/162627/red-hat-security-advisory-2021-1611-01.html", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2021.1866", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2021.1820", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2021.1687", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2021.3848", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2021.2365", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2021.2180", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2021.3471", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/163276/red-hat-security-advisory-2021-2543-01.html", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/164553/red-hat-security-advisory-2021-3900-01.html", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/78606", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2021102006", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2021052027", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/152445/debian-security-advisory-4428-1.html", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/163496/red-hat-security-advisory-2021-2705-01.html", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/164901/red-hat-security-advisory-2021-4582-02.html", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2021.2228", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2021062703", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2021092220", }, { trust: 0.6, url: "https://www.ibm.com/support/pages/node/6520474", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/162837/red-hat-security-advisory-2021-2136-01.html", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/163267/red-hat-security-advisory-2021-2532-01.html", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/78770", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2021071516", }, { trust: 0.6, url: "https://packetstormsecurity.com/files/162877/red-hat-security-advisory-2021-2121-01.html", }, { trust: 0.6, url: "https://www.cybersecurity-help.cz/vdb/sb2021062315", }, { trust: 0.6, url: "https://vigilance.fr/vulnerability/systemd-privilege-escalation-via-pam-module-policykit-spoofing-28965", }, { trust: 0.6, url: "https://www.auscert.org.au/bulletins/esb-2021.4058", }, { trust: 0.5, url: "https://nvd.nist.gov/vuln/detail/cve-2020-13434", }, { trust: 0.4, url: "https://access.redhat.com/security/cve/cve-2021-20305", }, { trust: 0.4, url: "https://access.redhat.com/security/cve/cve-2020-26116", }, { trust: 0.4, url: "https://access.redhat.com/security/cve/cve-2020-27619", }, { trust: 0.4, url: "https://access.redhat.com/security/cve/cve-2021-3177", }, { trust: 0.4, url: "https://access.redhat.com/security/cve/cve-2021-23336", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2020-15358", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2017-14502", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2020-27618", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2020-8231", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2020-24977", }, { trust: 0.4, url: "https://access.redhat.com/security/cve/cve-2017-14502", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2020-28196", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2020-29362", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2020-29363", }, { trust: 0.4, url: "https://nvd.nist.gov/vuln/detail/cve-2020-29361", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2020-13543", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2020-9951", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2020-9948", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2019-13012", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2020-13584", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2020-26137", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2020-9983", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2019-13012", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2021-3449", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2021-3450", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2020-8284", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2020-8285", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2020-8286", }, { trust: 0.3, url: "https://nvd.nist.gov/vuln/detail/cve-2020-8927", }, { trust: 0.3, url: "https://access.redhat.com/security/cve/cve-2021-27219", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-14347", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-36322", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-12114", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-25712", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2020-12114", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-27835", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-25704", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2021-3121", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-10878", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19528", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2020-0431", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-14363", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2019-18811", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2020-13543", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-14360", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2020-13584", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2019-19528", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-12464", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-14314", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-12362", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-14356", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-27786", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-25643", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-24394", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-0431", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2021-0342", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2019-18811", }, { trust: 0.2, url: "https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-14345", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-14344", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2019-19523", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-14362", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-14361", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2020-10543", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-25285", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-35508", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2020-12362", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-25212", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2019-19523", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-28974", }, { trust: 0.2, url: "https://issues.jboss.org/):", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-10543", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-15437", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-25284", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-14346", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2020-10878", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2020-11608", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-11608", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2020-12464", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2020-26116", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-36242", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2020-27619", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2019-14866", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2019-14866", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-27783", }, { trust: 0.2, url: "https://access.redhat.com/security/cve/cve-2020-25659", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2021-27219", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2021-20305", }, { trust: 0.2, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3326", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/863.html", }, { trust: 0.1, url: "https://usn.ubuntu.com/3938-1/", }, { trust: 0.1, url: "https://tools.cisco.com/security/center/viewalert.x?alertid=59981", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-14346", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-14345", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-14347", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-14360", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2021:2136", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-14314", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-14344", }, { trust: 0.1, url: "https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-u", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-14356", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2021:2479", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-23240", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-3139", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-26137", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-23239", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-25659", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-36242", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-27783", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-3528", }, { trust: 0.1, url: "https://access.redhat.com/articles/11258", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-25678", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-25678", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-25736", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3450", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2021:2130", }, { trust: 0.1, url: "https://docs.openshift.com/container-platform/4.7/windows_containers/window", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-25736", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3449", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-28500", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-28500", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-13949", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-28362", }, { trust: 0.1, url: "https://docs.openshift.com/container-platform/4.7/jaeger/jaeger_install/rhb", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-3114", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-28362", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2021:2543", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-23336", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2020-13949", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-23337", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-27918", }, { trust: 0.1, url: "https://access.redhat.com/documentation/en-us/openshift_container_platform/", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2021:2705", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-31525", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-31525", }, { trust: 0.1, url: "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-27918", }, { trust: 0.1, url: "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-33196", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-33196", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-25039", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-15586", }, { trust: 0.1, url: "https://docs.openshift.com/container-platform/4.7/updating/updating-cluster", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-25037", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-25037", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-28935", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-25034", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-16845", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-25035", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-25038", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-21645", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-25040", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-24330", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-25042", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-25042", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-25038", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-25032", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-25041", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-25036", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-25032", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-21643", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-25215", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-24331", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-25036", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-30465", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-25035", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-21644", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2021:2121", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2020-24332", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-25039", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2019-25040", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-25041", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2021:2122", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-21642", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2019-25034", }, { trust: 0.1, url: "https://usn.ubuntu.com/usn/usn-3938-1", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/systemd/229-4ubuntu21.21", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/systemd/204-5ubuntu20.31", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/systemd/239-7ubuntu10.12", }, { trust: 0.1, url: "https://launchpad.net/ubuntu/+source/systemd/237-3ubuntu10.19", }, { trust: 0.1, url: "https://access.redhat.com/errata/rhsa-2021:4582", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-34558", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-22923", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-22922", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-3620", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-22922", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-3620", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2021-34558", }, { trust: 0.1, url: "https://access.redhat.com/security/cve/cve-2021-22923", }, ], sources: [ { db: "CNVD", id: "CNVD-2019-14937", }, { db: "VULMON", id: "CVE-2019-3842", }, { db: "PACKETSTORM", id: "162837", }, { db: "PACKETSTORM", id: "163209", }, { db: "PACKETSTORM", id: "163257", }, { db: "PACKETSTORM", id: "163276", }, { db: "PACKETSTORM", id: "163496", }, { db: "PACKETSTORM", id: "162877", }, { db: "PACKETSTORM", id: "152442", }, { db: "PACKETSTORM", id: "164901", }, { db: "CNNVD", id: "CNNVD-201904-418", }, { db: "NVD", id: "CVE-2019-3842", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2019-14937", }, { db: "VULMON", id: "CVE-2019-3842", }, { db: "PACKETSTORM", id: "162837", }, { db: "PACKETSTORM", id: "163209", }, { db: "PACKETSTORM", id: "163257", }, { db: "PACKETSTORM", id: "163276", }, { db: "PACKETSTORM", id: "163496", }, { db: "PACKETSTORM", id: "162877", }, { db: "PACKETSTORM", id: "152442", }, { db: "PACKETSTORM", id: "164901", }, { db: "CNNVD", id: "CNNVD-201904-418", }, { db: "NVD", id: "CVE-2019-3842", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2019-05-21T00:00:00", db: "CNVD", id: "CNVD-2019-14937", }, { date: "2019-04-09T00:00:00", db: "VULMON", id: "CVE-2019-3842", }, { date: "2021-05-27T13:28:54", db: "PACKETSTORM", id: "162837", }, { date: "2021-06-17T18:34:10", db: "PACKETSTORM", id: "163209", }, { date: "2021-06-23T15:44:15", db: "PACKETSTORM", id: "163257", }, { date: "2021-06-24T17:54:53", db: "PACKETSTORM", id: "163276", }, { date: "2021-07-14T15:02:07", db: "PACKETSTORM", id: "163496", }, { date: "2021-06-01T14:45:29", db: "PACKETSTORM", id: "162877", }, { date: "2019-04-09T17:52:10", db: "PACKETSTORM", id: "152442", }, { date: "2021-11-10T17:15:07", db: "PACKETSTORM", id: "164901", }, { date: "2019-04-09T00:00:00", db: "CNNVD", id: "CNNVD-201904-418", }, { date: "2019-04-09T21:29:03.443000", db: "NVD", id: "CVE-2019-3842", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2019-05-21T00:00:00", db: "CNVD", id: "CNVD-2019-14937", }, { date: "2023-11-07T00:00:00", db: "VULMON", id: "CVE-2019-3842", }, { date: "2022-02-07T00:00:00", db: "CNNVD", id: "CNNVD-201904-418", }, { date: "2024-11-21T04:42:40.903000", db: "NVD", id: "CVE-2019-3842", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "PACKETSTORM", id: "152442", }, { db: "CNNVD", id: "CNNVD-201904-418", }, ], trust: 0.7, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Systemd permission and access control issue vulnerability", sources: [ { db: "CNVD", id: "CNVD-2019-14937", }, ], trust: 0.6, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "authorization issue", sources: [ { db: "CNNVD", id: "CNNVD-201904-418", }, ], trust: 0.6, }, }
fkie_cve-2019-3842
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
systemd_project | systemd | * | |
systemd_project | systemd | 242 | |
systemd_project | systemd | 242 | |
systemd_project | systemd | 242 | |
redhat | enterprise_linux | 7.0 | |
fedoraproject | fedora | 30 | |
debian | debian_linux | 8.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*", matchCriteriaId: "02E0A07B-34D3-403B-A503-CB11C9203FE9", versionEndIncluding: "241", vulnerable: true, }, { criteria: "cpe:2.3:a:systemd_project:systemd:242:rc1:*:*:*:*:*:*", matchCriteriaId: "3E2ACFB1-6787-47D0-B7F3-CF4F129732A2", vulnerable: true, }, { criteria: "cpe:2.3:a:systemd_project:systemd:242:rc2:*:*:*:*:*:*", matchCriteriaId: "22EB9C1F-9101-4AD5-80FD-CB5EA224A13F", vulnerable: true, }, { criteria: "cpe:2.3:a:systemd_project:systemd:242:rc3:*:*:*:*:*:*", matchCriteriaId: "9A203307-2242-475A-8ADF-3A1D112655D5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", matchCriteriaId: "142AD0DD-4CF3-4D74-9442-459CE3347E3A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", matchCriteriaId: "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", matchCriteriaId: "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", }, { lang: "es", value: "En systemd anterior de la versión v242-rc4, fue encontrado que pam_systemd no sanea apropiadamente el entorno anterior usando la variable XDG_SEAT. Es posible que un atacante, en ciertas configuraciones particulares, establezca una variable de entorno XDG_SEAT que permita comprobar los comandos contra las políticas polkit utilizando el elemento \"allow_active\" en lugar de \"allow_any\".", }, ], id: "CVE-2019-3842", lastModified: "2024-11-21T04:42:40.903", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.4, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.4, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "LOW", baseScore: 4.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, exploitabilityScore: 1, impactScore: 3.4, source: "secalert@redhat.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-04-09T21:29:03.443", references: [ { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html", }, { source: "secalert@redhat.com", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html", }, { source: "secalert@redhat.com", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, { source: "secalert@redhat.com", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { source: "secalert@redhat.com", tags: [ "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html", }, { source: "secalert@redhat.com", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/", }, { source: "secalert@redhat.com", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/46743/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/46743/", }, ], sourceIdentifier: "secalert@redhat.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-285", }, ], source: "secalert@redhat.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-863", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
gsd-2019-3842
Vulnerability from gsd
{ GSD: { alias: "CVE-2019-3842", description: "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", id: "GSD-2019-3842", references: [ "https://www.suse.com/security/cve/CVE-2019-3842.html", "https://www.debian.org/security/2019/dsa-4428", "https://access.redhat.com/errata/RHSA-2021:3900", "https://access.redhat.com/errata/RHSA-2021:1611", "https://ubuntu.com/security/CVE-2019-3842", "https://linux.oracle.com/cve/CVE-2019-3842.html", "https://packetstormsecurity.com/files/cve/CVE-2019-3842", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2019-3842", ], details: "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", id: "GSD-2019-3842", modified: "2023-12-13T01:24:04.749632Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2019-3842", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "systemd", version: { version_data: [ { version_value: "v242-rc4", }, ], }, }, ], }, vendor_name: "The systemd Project", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", }, ], }, impact: { cvss: [ [ { vectorString: "4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, ], ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-285", }, ], }, ], }, references: { reference_data: [ { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842", }, { name: "FEDORA-2019-3fa5db9e19", refsource: "FEDORA", url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/", }, { name: "46743", refsource: "EXPLOIT-DB", url: "https://www.exploit-db.com/exploits/46743/", }, { name: "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html", }, { name: "[debian-lts-announce] 20190424 [SECURITY] [DLA 1762-1] systemd security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html", }, { name: "openSUSE-SU-2019:1450", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:systemd_project:systemd:242:rc1:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:systemd_project:systemd:242:rc2:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:systemd_project:systemd:242:rc3:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "241", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "secalert@redhat.com", ID: "CVE-2019-3842", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "CWE-863", }, ], }, ], }, references: { reference_data: [ { name: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842", refsource: "CONFIRM", tags: [ "Issue Tracking", "Third Party Advisory", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842", }, { name: "FEDORA-2019-3fa5db9e19", refsource: "FEDORA", tags: [ "Mailing List", "Release Notes", "Third Party Advisory", ], url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/", }, { name: "46743", refsource: "EXPLOIT-DB", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "https://www.exploit-db.com/exploits/46743/", }, { name: "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html", refsource: "MISC", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html", }, { name: "[debian-lts-announce] 20190424 [SECURITY] [DLA 1762-1] systemd security update", refsource: "MLIST", tags: [ "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html", }, { name: "openSUSE-SU-2019:1450", refsource: "SUSE", tags: [ "Third Party Advisory", ], url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html", }, { name: "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", tags: [ "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", }, { name: "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8", refsource: "MLIST", tags: [ "Third Party Advisory", ], url: "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.4, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.4, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1, impactScore: 5.9, }, }, lastModifiedDate: "2022-01-31T18:51Z", publishedDate: "2019-04-09T21:29Z", }, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.