Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-5326 (GCVE-0-2014-5326)
Vulnerability from cvelistv5
Published
2014-11-24 02:00
Modified
2024-08-06 11:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
► | URL | Tags | |
---|---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:41:48.653Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVN#52422792", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN52422792/index.html" }, { "name": "JVNDB-2014-000118", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000118" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-11-24T02:57:00", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "JVN#52422792", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN52422792/index.html" }, { "name": "JVNDB-2014-000118", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000118" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2014-5326", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "JVN#52422792", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN52422792/index.html" }, { "name": "JVNDB-2014-000118", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000118" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2014-5326", "datePublished": "2014-11-24T02:00:00", "dateReserved": "2014-08-18T00:00:00", "dateUpdated": "2024-08-06T11:41:48.653Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-5326\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2014-11-24T02:59:03.160\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de XSS en Direct Web Remoting (DWR) hasta 2.0.10 y 3.x hasta 3.0.RC2 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores no especificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:directwebremoting:direct_web_remoting:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.0.10\",\"matchCriteriaId\":\"86A40D75-2A67-485B-8F03-03D7B8B3300C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:directwebremoting:direct_web_remoting:3.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"15EC6841-1ACB-4CA9-B636-73FD4848B6A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:directwebremoting:direct_web_remoting:3.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B95F48BD-B339-4587-B3E2-99D715173F3F\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/jp/JVN52422792/index.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2014-000118\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://jvn.jp/en/jp/JVN52422792/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2014-000118\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
cve-2014-5326
Vulnerability from jvndb
Published
2014-11-14 14:37
Modified
2014-11-25 17:51
Summary
Direct Web Remoting (DWR) vulnerable to cross-site scripting
Details
Direct Web Remoting (DWR) is a Java framework for developing Ajax into web applications. DWR contains a cross-site scripting vulnerability (CWE-79).
Takeshi Terada of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
► | Type | URL |
---|---|---|
Impacted products
► | Vendor | Product |
---|---|---|
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000118.html", "dc:date": "2014-11-25T17:51+09:00", "dcterms:issued": "2014-11-14T14:37+09:00", "dcterms:modified": "2014-11-25T17:51+09:00", "description": "Direct Web Remoting (DWR) is a Java framework for developing Ajax into web applications. DWR contains a cross-site scripting vulnerability (CWE-79).\r\n\r\nTakeshi Terada of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000118.html", "sec:cpe": { "#text": "cpe:/a:directwebremoting:direct_web_remoting", "@product": "DWR", "@vendor": "Direct Web Remoting", "@version": "2.2" }, "sec:cvss": { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2014-000118", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN52422792/", "@id": "JVN#52422792", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5326", "@id": "CVE-2014-5326", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5326", "@id": "CVE-2014-5326", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "Direct Web Remoting (DWR) vulnerable to cross-site scripting" }
fkie_cve-2014-5326
Vulnerability from fkie_nvd
Published
2014-11-24 02:59
Modified
2025-04-12 10:46
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
directwebremoting | direct_web_remoting | * | |
directwebremoting | direct_web_remoting | 3.0 | |
directwebremoting | direct_web_remoting | 3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:directwebremoting:direct_web_remoting:*:*:*:*:*:*:*:*", "matchCriteriaId": "86A40D75-2A67-485B-8F03-03D7B8B3300C", "versionEndIncluding": "2.0.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:directwebremoting:direct_web_remoting:3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "15EC6841-1ACB-4CA9-B636-73FD4848B6A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:directwebremoting:direct_web_remoting:3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "B95F48BD-B339-4587-B3E2-99D715173F3F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de XSS en Direct Web Remoting (DWR) hasta 2.0.10 y 3.x hasta 3.0.RC2 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2014-5326", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-11-24T02:59:03.160", "references": [ { "source": "vultures@jpcert.or.jp", "url": "http://jvn.jp/en/jp/JVN52422792/index.html" }, { "source": "vultures@jpcert.or.jp", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/en/jp/JVN52422792/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000118" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
suse-su-2018:1745-1
Vulnerability from csaf_suse
Published
2018-06-19 13:46
Modified
2018-06-19 13:46
Summary
Security update for dwr
Notes
Title of the patch
Security update for dwr
Description of the patch
This update for dwr fixes the following issues:
Security issue fixed:
- CVE-2014-5326: Fix cross-site scripting (XSS) vulnerability (bsc#1085650).
Patchnames
SUSE-SUSE-Manager-Server-3.0-2018-1172
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for dwr", "title": "Title of the patch" }, { "category": "description", "text": "This update for dwr fixes the following issues:\n\nSecurity issue fixed:\n\n- CVE-2014-5326: Fix cross-site scripting (XSS) vulnerability (bsc#1085650).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SUSE-Manager-Server-3.0-2018-1172", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1745-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1745-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181745-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1745-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004200.html" }, { "category": "self", "summary": "SUSE Bug 1085650", "url": "https://bugzilla.suse.com/1085650" }, { "category": "self", "summary": "SUSE CVE CVE-2014-5326 page", "url": "https://www.suse.com/security/cve/CVE-2014-5326/" } ], "title": "Security update for dwr", "tracking": { "current_release_date": "2018-06-19T13:46:13Z", "generator": { "date": "2018-06-19T13:46:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1745-1", "initial_release_date": "2018-06-19T13:46:13Z", "revision_history": [ { "date": "2018-06-19T13:46:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dwr-3.0rc2+svn4059-0.12.3.1.noarch", "product": { "name": "dwr-3.0rc2+svn4059-0.12.3.1.noarch", "product_id": "dwr-3.0rc2+svn4059-0.12.3.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Manager Server 3.0", "product": { "name": "SUSE Manager Server 3.0", "product_id": "SUSE Manager Server 3.0", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:3.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dwr-3.0rc2+svn4059-0.12.3.1.noarch as component of SUSE Manager Server 3.0", "product_id": "SUSE Manager Server 3.0:dwr-3.0rc2+svn4059-0.12.3.1.noarch" }, "product_reference": "dwr-3.0rc2+svn4059-0.12.3.1.noarch", "relates_to_product_reference": "SUSE Manager Server 3.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-5326", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-5326" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Server 3.0:dwr-3.0rc2+svn4059-0.12.3.1.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2014-5326", "url": "https://www.suse.com/security/cve/CVE-2014-5326" }, { "category": "external", "summary": "SUSE Bug 1085650 for CVE-2014-5326", "url": "https://bugzilla.suse.com/1085650" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Server 3.0:dwr-3.0rc2+svn4059-0.12.3.1.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Manager Server 3.0:dwr-3.0rc2+svn4059-0.12.3.1.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-06-19T13:46:13Z", "details": "moderate" } ], "title": "CVE-2014-5326" } ] }
suse-su-2018:1751-1
Vulnerability from csaf_suse
Published
2018-06-19 13:47
Modified
2018-06-19 13:47
Summary
Security update for SUSE Manager Server 3.1
Notes
Title of the patch
Security update for SUSE Manager Server 3.1
Description of the patch
This update provides the following fixes and improvements for SUSE Manager Server 3.1:
The following new package has been added:
py26-compat-salt:
This package provides compatibility with Python 2.6 for salt.
This update includes the following new features:
(fate#325476)
Additonally, the following issues have been fixed:
cobbler:
- Detect if there is already another instance of 'cobbler sync'
running and exit with failure if so. (bsc#1081714)
- CVE-2017-1000469: Escape shell parameters provided by the user
for the reposync action. (bsc#1074594)
- Add sles15 distro profile. (bsc#1090205)
google-gson:
- Update to version 2.8.2. (bsc#1091091)
patterns-suse-manager:
- Require py26-compat-salt and python3-salt to be able to connect with
salt-ssh to a system which has python2.6 or python3 installed. (fate#325476)
salt-netapi-client:
- See https://github.com/SUSE/salt-netapi-client/releases/tag/v0.14.0
spacewalk-backend:
- Do not fail boostrap if no ip6addr interface. (bsc#1090395)
- Allow again to use a higher version of spacewalk-backend-libs
with spacewalk-backend. (bsc#1092383)
- SLE15 support: recommended/required flag for products and channels.
spacewalk-branding:
- Fix URL for new products page. (bsc#1092492)
- SLE15 support: recommended/required flag for products and channels.
- Show channel label when listing config channels. (bsc#1083278)
spacewalk-certs-tools:
- Fix bootstrap script for python3. (bsc#1091840)
- Support SLE15 product family.
spacewalk-java:
- Do not create new product if product_id exists, update it instead (bsc#1096714)
- Fix deletion of Taskomatic schedules via the GUI (bsc#1095569)
- Fix unknown installed products when using salt-ssh. (bsc#1088861)
- Prevent NPE when no image build history details are available. (bsc#1092161)
- Uniform the notification message when scheduling HW refresh. (bsc#1082796)
- Add SLES12 SP2 LTSS family. (bsc#1092194)
- Fix token cleanup task crashing. (bsc#1090585)
- HW refresh fails on SLE15 Salt client. (bsc#1090221)
- Only show the most relevant (least effort) solutions. (bsc#1087071)
- Add support for autoinstallation of SLE15. (bsc#1090205)
- Update sles_register cobbler snippets to work with SLE15. (bsc#1090205)
- Support SLE15 product family.
- Show channel label when listing config channels. (bsc#1083278)
- Fix equals to display channels with same name but different label. (bsc#1083278)
- Avoid init.sls files with no revision on Config State Channels. (bsc#1091855)
- Fix taskomatic deadlock in failure case. (bsc#1085471)
- Render configuration files with UTF-8. (bsc#1088667)
- Update google-gson to version 2.8.2. (bsc#1091091)
- Fix updating Subscription cache. (bsc#1075466)
- Fix NPE in websocket session configurator. (bsc#1080474)
- Wait until minion is back to set RebootAction as COMPLETED. (bsc#1089401)
- Add support for Prometheus monitoring.
- Fix constraint violation errors when onboarding. (bsc#1089468)
- Fix Advanced search for systems with installed packages. (bsc#1085838)
spacewalk-utils:
- Clone-by-date removes packages only if the list is not empty. (bsc#1089396)
spacewalk-web:
- Fix misleading message when syncing channels. (bsc#1089103)
- Automatically select mandatory channels when selecting a base channel. (bsc#1083513)
- Fix ace.js editor config to use soft tabs. (bsc#1090040)
- Display always config channel name and label. (bsc#1083278)
susemanager:
- Add missing python3 packages to bootstrap JeOS image. (bsc#1085044)
- Support SLE15 product family.
- Fix crash on not properly configured environment. (bsc#1092275)
- Provide full traditional stack in RES bootstrap repo. (bsc#1091667)
- Fix bootstrap script for python3. (bsc#1091840)
- Fix unknown installed products when using salt-ssh. (bsc#1088861)
- Add python2-salt to RES7 and SLES12 bootstrap repository.
- Fix bootstrapping RHEL 7 salt client (missing python-ipaddress). (bsc#1087055)
susemanager-frontend-libs:
- Enforce susemanager-nodejs-sdk-devel dependency version. (bsc#1095231)
susemanager-docs_en:
- Documentation: mgr-create-bootstrap-repo documented flag is not correct. (bsc#1090400)
- Remove LTSS from SUSE Linux Enterprise 11 SP4 in gs. (bsc#1090401)
- Configuration Macros do not work. (bsc#1084679)
- Updated spacecmd with new functions.
- Update bootstrap warning for sles 15 clients and python 3 - in reference and gs.
susemanager-schema:
- Add SLE15 distribution. (bsc#1090205)
- SLE15 support: recommended/required flag for products and channels.
- Support SLE15 product family.
- Fix a race condition on lookup_evr. (bsc#1090059)
susemanager-sls:
- Install python2/3 salt flavours on buildhosts to generate a compatible
thin for the dockerimage beeing build. (bsc#1092161)
- Docker.login requires a list as input. (bsc#1092161)
- Fix profileupdate sls to execute retrieval of kernel live patching info. (bsc#1091052)
- Support SLE15 product family.
- Fix hardware refresh when FQDN changes. (bsc#1073267)
- Create bootstrap repo only if it exist in the server. (bsc#1087840)
- Fix master tops merging when running salt>=2018.
- Use dockermod with new salt and user repository/tag option for build.
susemanager-sync-data:
- Set SLE15 channel update tags to final version.
- Add SLES12 SP2 LTSS family. (bsc#1092194)
- Add SLES12-SP2-LTSS product classes. (bsc#1092194)
- Add debuginfo channels for SLE15 products.
- Add PackageHub 15 Products.
- Add product sle-module-live-patching 15.
- Add new HPC 15 Product.
- Add missing channel to sle-module-basesystem 15.
- Support SLE15 product family.
susemanager-tftpsync:
- Detect if there is already another instance of 'cobbler sync'
running and exit with failure if so. (bsc#1081714)
Patchnames
SUSE-SUSE-Manager-Server-3.1-2018-1174
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for SUSE Manager Server 3.1", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update provides the following fixes and improvements for SUSE Manager Server 3.1:\n\nThe following new package has been added:\n\npy26-compat-salt:\n\nThis package provides compatibility with Python 2.6 for salt.\n\nThis update includes the following new features:\n\n (fate#325476)\n\nAdditonally, the following issues have been fixed:\n\ncobbler:\n\n- Detect if there is already another instance of \u0027cobbler sync\u0027\n running and exit with failure if so. (bsc#1081714)\n- CVE-2017-1000469: Escape shell parameters provided by the user \n for the reposync action. (bsc#1074594)\n- Add sles15 distro profile. (bsc#1090205)\n\ngoogle-gson:\n\n- Update to version 2.8.2. (bsc#1091091)\n\npatterns-suse-manager:\n\n- Require py26-compat-salt and python3-salt to be able to connect with\n salt-ssh to a system which has python2.6 or python3 installed. (fate#325476)\n\nsalt-netapi-client:\n\n- See https://github.com/SUSE/salt-netapi-client/releases/tag/v0.14.0\n\nspacewalk-backend:\n\n- Do not fail boostrap if no ip6addr interface. (bsc#1090395)\n- Allow again to use a higher version of spacewalk-backend-libs\n with spacewalk-backend. (bsc#1092383)\n- SLE15 support: recommended/required flag for products and channels.\n\nspacewalk-branding:\n\n- Fix URL for new products page. (bsc#1092492)\n- SLE15 support: recommended/required flag for products and channels.\n- Show channel label when listing config channels. (bsc#1083278)\n\nspacewalk-certs-tools:\n\n- Fix bootstrap script for python3. (bsc#1091840)\n- Support SLE15 product family.\n\nspacewalk-java:\n\n- Do not create new product if product_id exists, update it instead (bsc#1096714)\n- Fix deletion of Taskomatic schedules via the GUI (bsc#1095569)\n- Fix unknown installed products when using salt-ssh. (bsc#1088861)\n- Prevent NPE when no image build history details are available. (bsc#1092161)\n- Uniform the notification message when scheduling HW refresh. (bsc#1082796)\n- Add SLES12 SP2 LTSS family. (bsc#1092194)\n- Fix token cleanup task crashing. (bsc#1090585)\n- HW refresh fails on SLE15 Salt client. (bsc#1090221)\n- Only show the most relevant (least effort) solutions. (bsc#1087071)\n- Add support for autoinstallation of SLE15. (bsc#1090205)\n- Update sles_register cobbler snippets to work with SLE15. (bsc#1090205)\n- Support SLE15 product family.\n- Show channel label when listing config channels. (bsc#1083278)\n- Fix equals to display channels with same name but different label. (bsc#1083278)\n- Avoid init.sls files with no revision on Config State Channels. (bsc#1091855)\n- Fix taskomatic deadlock in failure case. (bsc#1085471)\n- Render configuration files with UTF-8. (bsc#1088667)\n- Update google-gson to version 2.8.2. (bsc#1091091)\n- Fix updating Subscription cache. (bsc#1075466)\n- Fix NPE in websocket session configurator. (bsc#1080474)\n- Wait until minion is back to set RebootAction as COMPLETED. (bsc#1089401)\n- Add support for Prometheus monitoring.\n- Fix constraint violation errors when onboarding. (bsc#1089468)\n- Fix Advanced search for systems with installed packages. (bsc#1085838)\n\nspacewalk-utils:\n\n- Clone-by-date removes packages only if the list is not empty. (bsc#1089396)\n\nspacewalk-web:\n\n- Fix misleading message when syncing channels. (bsc#1089103)\n- Automatically select mandatory channels when selecting a base channel. (bsc#1083513)\n- Fix ace.js editor config to use soft tabs. (bsc#1090040)\n- Display always config channel name and label. (bsc#1083278)\n\nsusemanager:\n\n- Add missing python3 packages to bootstrap JeOS image. (bsc#1085044)\n- Support SLE15 product family.\n- Fix crash on not properly configured environment. (bsc#1092275)\n- Provide full traditional stack in RES bootstrap repo. (bsc#1091667)\n- Fix bootstrap script for python3. (bsc#1091840)\n- Fix unknown installed products when using salt-ssh. (bsc#1088861)\n- Add python2-salt to RES7 and SLES12 bootstrap repository.\n- Fix bootstrapping RHEL 7 salt client (missing python-ipaddress). (bsc#1087055)\n\nsusemanager-frontend-libs:\n\n- Enforce susemanager-nodejs-sdk-devel dependency version. (bsc#1095231)\n\nsusemanager-docs_en:\n\n- Documentation: mgr-create-bootstrap-repo documented flag is not correct. (bsc#1090400)\n- Remove LTSS from SUSE Linux Enterprise 11 SP4 in gs. (bsc#1090401)\n- Configuration Macros do not work. (bsc#1084679)\n- Updated spacecmd with new functions.\n- Update bootstrap warning for sles 15 clients and python 3 - in reference and gs.\n\nsusemanager-schema:\n\n- Add SLE15 distribution. (bsc#1090205)\n- SLE15 support: recommended/required flag for products and channels.\n- Support SLE15 product family.\n- Fix a race condition on lookup_evr. (bsc#1090059)\n\nsusemanager-sls:\n\n- Install python2/3 salt flavours on buildhosts to generate a compatible\n thin for the dockerimage beeing build. (bsc#1092161)\n- Docker.login requires a list as input. (bsc#1092161)\n- Fix profileupdate sls to execute retrieval of kernel live patching info. (bsc#1091052)\n- Support SLE15 product family.\n- Fix hardware refresh when FQDN changes. (bsc#1073267)\n- Create bootstrap repo only if it exist in the server. (bsc#1087840)\n- Fix master tops merging when running salt\u003e=2018.\n- Use dockermod with new salt and user repository/tag option for build.\n\nsusemanager-sync-data:\n\n- Set SLE15 channel update tags to final version.\n- Add SLES12 SP2 LTSS family. (bsc#1092194)\n- Add SLES12-SP2-LTSS product classes. (bsc#1092194)\n- Add debuginfo channels for SLE15 products.\n- Add PackageHub 15 Products.\n- Add product sle-module-live-patching 15.\n- Add new HPC 15 Product.\n- Add missing channel to sle-module-basesystem 15.\n- Support SLE15 product family.\n\nsusemanager-tftpsync:\n\n- Detect if there is already another instance of \u0027cobbler sync\u0027\n running and exit with failure if so. (bsc#1081714)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SUSE-Manager-Server-3.1-2018-1174", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1751-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1751-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181751-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1751-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2018-June/004201.html" }, { "category": "self", "summary": "SUSE Bug 1073267", "url": "https://bugzilla.suse.com/1073267" }, { "category": "self", "summary": "SUSE Bug 1074594", "url": "https://bugzilla.suse.com/1074594" }, { "category": "self", "summary": "SUSE Bug 1075466", "url": "https://bugzilla.suse.com/1075466" }, { "category": "self", "summary": "SUSE Bug 1080474", "url": "https://bugzilla.suse.com/1080474" }, { "category": "self", "summary": "SUSE Bug 1081714", "url": "https://bugzilla.suse.com/1081714" }, { "category": "self", "summary": "SUSE Bug 1082796", "url": "https://bugzilla.suse.com/1082796" }, { "category": "self", "summary": "SUSE Bug 1083278", "url": "https://bugzilla.suse.com/1083278" }, { "category": "self", "summary": "SUSE Bug 1083513", "url": "https://bugzilla.suse.com/1083513" }, { "category": "self", "summary": "SUSE Bug 1084679", "url": "https://bugzilla.suse.com/1084679" }, { "category": "self", "summary": "SUSE Bug 1085044", "url": "https://bugzilla.suse.com/1085044" }, { "category": "self", "summary": "SUSE Bug 1085471", "url": "https://bugzilla.suse.com/1085471" }, { "category": "self", "summary": "SUSE Bug 1085650", "url": "https://bugzilla.suse.com/1085650" }, { "category": "self", "summary": "SUSE Bug 1085838", "url": "https://bugzilla.suse.com/1085838" }, { "category": "self", "summary": "SUSE Bug 1087055", "url": "https://bugzilla.suse.com/1087055" }, { "category": "self", "summary": "SUSE Bug 1087071", "url": "https://bugzilla.suse.com/1087071" }, { "category": "self", "summary": "SUSE Bug 1087840", "url": "https://bugzilla.suse.com/1087840" }, { "category": "self", "summary": "SUSE Bug 1088667", "url": "https://bugzilla.suse.com/1088667" }, { "category": "self", "summary": "SUSE Bug 1088861", "url": "https://bugzilla.suse.com/1088861" }, { "category": "self", "summary": "SUSE Bug 1089103", "url": "https://bugzilla.suse.com/1089103" }, { "category": "self", "summary": "SUSE Bug 1089396", "url": "https://bugzilla.suse.com/1089396" }, { "category": "self", "summary": "SUSE Bug 1089401", "url": "https://bugzilla.suse.com/1089401" }, { "category": "self", "summary": "SUSE Bug 1089468", "url": "https://bugzilla.suse.com/1089468" }, { "category": "self", "summary": "SUSE Bug 1090040", "url": "https://bugzilla.suse.com/1090040" }, { "category": "self", "summary": "SUSE Bug 1090059", "url": "https://bugzilla.suse.com/1090059" }, { "category": "self", "summary": "SUSE Bug 1090205", "url": "https://bugzilla.suse.com/1090205" }, { "category": "self", "summary": "SUSE Bug 1090221", "url": "https://bugzilla.suse.com/1090221" }, { "category": "self", "summary": "SUSE Bug 1090395", "url": "https://bugzilla.suse.com/1090395" }, { "category": "self", "summary": "SUSE Bug 1090400", "url": "https://bugzilla.suse.com/1090400" }, { "category": "self", "summary": "SUSE Bug 1090401", "url": "https://bugzilla.suse.com/1090401" }, { "category": "self", "summary": "SUSE Bug 1090585", "url": "https://bugzilla.suse.com/1090585" }, { "category": "self", "summary": "SUSE Bug 1091052", "url": "https://bugzilla.suse.com/1091052" }, { "category": "self", "summary": "SUSE Bug 1091091", "url": "https://bugzilla.suse.com/1091091" }, { "category": "self", "summary": "SUSE Bug 1091667", "url": "https://bugzilla.suse.com/1091667" }, { "category": "self", "summary": "SUSE Bug 1091840", "url": "https://bugzilla.suse.com/1091840" }, { "category": "self", "summary": "SUSE Bug 1091855", "url": "https://bugzilla.suse.com/1091855" }, { "category": "self", "summary": "SUSE Bug 1092161", "url": "https://bugzilla.suse.com/1092161" }, { "category": "self", "summary": "SUSE Bug 1092194", "url": "https://bugzilla.suse.com/1092194" }, { "category": "self", "summary": "SUSE Bug 1092275", "url": "https://bugzilla.suse.com/1092275" }, { "category": "self", "summary": "SUSE Bug 1092383", "url": "https://bugzilla.suse.com/1092383" }, { "category": "self", "summary": "SUSE Bug 1092492", "url": "https://bugzilla.suse.com/1092492" }, { "category": "self", "summary": "SUSE Bug 1095231", "url": "https://bugzilla.suse.com/1095231" }, { "category": "self", "summary": "SUSE Bug 1095569", "url": "https://bugzilla.suse.com/1095569" }, { "category": "self", "summary": "SUSE Bug 1096714", "url": "https://bugzilla.suse.com/1096714" }, { "category": "self", "summary": "SUSE CVE CVE-2014-5326 page", "url": "https://www.suse.com/security/cve/CVE-2014-5326/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000469 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000469/" } ], "title": "Security update for SUSE Manager Server 3.1", "tracking": { "current_release_date": "2018-06-19T13:47:15Z", "generator": { "date": "2018-06-19T13:47:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1751-1", "initial_release_date": "2018-06-19T13:47:15Z", "revision_history": [ { "date": "2018-06-19T13:47:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cobbler-2.6.6-5.10.4.noarch", "product": { "name": "cobbler-2.6.6-5.10.4.noarch", "product_id": "cobbler-2.6.6-5.10.4.noarch" } }, { "category": "product_version", "name": "google-gson-2.8.2-3.3.6.noarch", "product": { "name": "google-gson-2.8.2-3.3.6.noarch", "product_id": "google-gson-2.8.2-3.3.6.noarch" } }, { "category": "product_version", "name": "prometheus-client-java-0.3.0-1.3.5.noarch", "product": { "name": "prometheus-client-java-0.3.0-1.3.5.noarch", "product_id": "prometheus-client-java-0.3.0-1.3.5.noarch" } }, { "category": "product_version", "name": "py26-compat-salt-2016.11.4-1.7.2.noarch", "product": { "name": "py26-compat-salt-2016.11.4-1.7.2.noarch", "product_id": "py26-compat-salt-2016.11.4-1.7.2.noarch" } }, { "category": "product_version", "name": "salt-netapi-client-0.14.0-3.9.5.noarch", "product": { "name": "salt-netapi-client-0.14.0-3.9.5.noarch", "product_id": "salt-netapi-client-0.14.0-3.9.5.noarch" } }, { "category": "product_version", "name": "spacewalk-backend-2.7.73.13-2.19.5.noarch", "product": { "name": "spacewalk-backend-2.7.73.13-2.19.5.noarch", "product_id": "spacewalk-backend-2.7.73.13-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-backend-app-2.7.73.13-2.19.5.noarch", "product": { "name": "spacewalk-backend-app-2.7.73.13-2.19.5.noarch", "product_id": "spacewalk-backend-app-2.7.73.13-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-backend-applet-2.7.73.13-2.19.5.noarch", "product": { "name": "spacewalk-backend-applet-2.7.73.13-2.19.5.noarch", "product_id": "spacewalk-backend-applet-2.7.73.13-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-backend-config-files-2.7.73.13-2.19.5.noarch", "product": { "name": "spacewalk-backend-config-files-2.7.73.13-2.19.5.noarch", "product_id": "spacewalk-backend-config-files-2.7.73.13-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-backend-config-files-common-2.7.73.13-2.19.5.noarch", "product": { "name": "spacewalk-backend-config-files-common-2.7.73.13-2.19.5.noarch", "product_id": "spacewalk-backend-config-files-common-2.7.73.13-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-backend-config-files-tool-2.7.73.13-2.19.5.noarch", "product": { "name": "spacewalk-backend-config-files-tool-2.7.73.13-2.19.5.noarch", "product_id": "spacewalk-backend-config-files-tool-2.7.73.13-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-backend-iss-2.7.73.13-2.19.5.noarch", "product": { "name": "spacewalk-backend-iss-2.7.73.13-2.19.5.noarch", "product_id": "spacewalk-backend-iss-2.7.73.13-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-backend-iss-export-2.7.73.13-2.19.5.noarch", "product": { "name": "spacewalk-backend-iss-export-2.7.73.13-2.19.5.noarch", "product_id": "spacewalk-backend-iss-export-2.7.73.13-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-backend-libs-2.7.73.13-2.19.5.noarch", "product": { "name": "spacewalk-backend-libs-2.7.73.13-2.19.5.noarch", "product_id": "spacewalk-backend-libs-2.7.73.13-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-backend-package-push-server-2.7.73.13-2.19.5.noarch", "product": { "name": "spacewalk-backend-package-push-server-2.7.73.13-2.19.5.noarch", "product_id": "spacewalk-backend-package-push-server-2.7.73.13-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-backend-server-2.7.73.13-2.19.5.noarch", "product": { "name": "spacewalk-backend-server-2.7.73.13-2.19.5.noarch", "product_id": "spacewalk-backend-server-2.7.73.13-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-backend-sql-2.7.73.13-2.19.5.noarch", "product": { "name": "spacewalk-backend-sql-2.7.73.13-2.19.5.noarch", "product_id": "spacewalk-backend-sql-2.7.73.13-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-backend-sql-oracle-2.7.73.13-2.19.5.noarch", "product": { "name": "spacewalk-backend-sql-oracle-2.7.73.13-2.19.5.noarch", "product_id": "spacewalk-backend-sql-oracle-2.7.73.13-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-backend-sql-postgresql-2.7.73.13-2.19.5.noarch", "product": { "name": "spacewalk-backend-sql-postgresql-2.7.73.13-2.19.5.noarch", "product_id": "spacewalk-backend-sql-postgresql-2.7.73.13-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-backend-tools-2.7.73.13-2.19.5.noarch", "product": { "name": "spacewalk-backend-tools-2.7.73.13-2.19.5.noarch", "product_id": "spacewalk-backend-tools-2.7.73.13-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-backend-xml-export-libs-2.7.73.13-2.19.5.noarch", "product": { "name": "spacewalk-backend-xml-export-libs-2.7.73.13-2.19.5.noarch", "product_id": "spacewalk-backend-xml-export-libs-2.7.73.13-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-backend-xmlrpc-2.7.73.13-2.19.5.noarch", "product": { "name": "spacewalk-backend-xmlrpc-2.7.73.13-2.19.5.noarch", "product_id": "spacewalk-backend-xmlrpc-2.7.73.13-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-base-2.7.1.16-2.19.5.noarch", "product": { "name": "spacewalk-base-2.7.1.16-2.19.5.noarch", "product_id": "spacewalk-base-2.7.1.16-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-base-minimal-2.7.1.16-2.19.5.noarch", "product": { "name": "spacewalk-base-minimal-2.7.1.16-2.19.5.noarch", "product_id": "spacewalk-base-minimal-2.7.1.16-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-base-minimal-config-2.7.1.16-2.19.5.noarch", "product": { "name": "spacewalk-base-minimal-config-2.7.1.16-2.19.5.noarch", "product_id": "spacewalk-base-minimal-config-2.7.1.16-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-certs-tools-2.7.0.10-2.12.4.noarch", "product": { "name": "spacewalk-certs-tools-2.7.0.10-2.12.4.noarch", "product_id": "spacewalk-certs-tools-2.7.0.10-2.12.4.noarch" } }, { "category": "product_version", "name": "spacewalk-html-2.7.1.16-2.19.5.noarch", "product": { "name": "spacewalk-html-2.7.1.16-2.19.5.noarch", "product_id": "spacewalk-html-2.7.1.16-2.19.5.noarch" } }, { "category": "product_version", "name": "spacewalk-java-2.7.46.14-2.25.1.noarch", "product": { "name": "spacewalk-java-2.7.46.14-2.25.1.noarch", "product_id": "spacewalk-java-2.7.46.14-2.25.1.noarch" } }, { "category": "product_version", "name": "spacewalk-java-config-2.7.46.14-2.25.1.noarch", "product": { "name": "spacewalk-java-config-2.7.46.14-2.25.1.noarch", "product_id": "spacewalk-java-config-2.7.46.14-2.25.1.noarch" } }, { "category": "product_version", "name": "spacewalk-java-lib-2.7.46.14-2.25.1.noarch", "product": { "name": "spacewalk-java-lib-2.7.46.14-2.25.1.noarch", "product_id": "spacewalk-java-lib-2.7.46.14-2.25.1.noarch" } }, { "category": "product_version", "name": "spacewalk-java-oracle-2.7.46.14-2.25.1.noarch", "product": { "name": "spacewalk-java-oracle-2.7.46.14-2.25.1.noarch", "product_id": "spacewalk-java-oracle-2.7.46.14-2.25.1.noarch" } }, { "category": "product_version", "name": "spacewalk-java-postgresql-2.7.46.14-2.25.1.noarch", "product": { "name": "spacewalk-java-postgresql-2.7.46.14-2.25.1.noarch", "product_id": "spacewalk-java-postgresql-2.7.46.14-2.25.1.noarch" } }, { "category": "product_version", "name": "spacewalk-taskomatic-2.7.46.14-2.25.1.noarch", "product": { "name": "spacewalk-taskomatic-2.7.46.14-2.25.1.noarch", "product_id": "spacewalk-taskomatic-2.7.46.14-2.25.1.noarch" } }, { "category": "product_version", "name": "spacewalk-utils-2.7.10.7-2.10.4.noarch", "product": { "name": "spacewalk-utils-2.7.10.7-2.10.4.noarch", "product_id": "spacewalk-utils-2.7.10.7-2.10.4.noarch" } }, { "category": "product_version", "name": "susemanager-advanced-topics_en-pdf-3.1-10.20.7.noarch", "product": { "name": "susemanager-advanced-topics_en-pdf-3.1-10.20.7.noarch", "product_id": "susemanager-advanced-topics_en-pdf-3.1-10.20.7.noarch" } }, { "category": "product_version", "name": "susemanager-best-practices_en-pdf-3.1-10.20.7.noarch", "product": { "name": "susemanager-best-practices_en-pdf-3.1-10.20.7.noarch", "product_id": "susemanager-best-practices_en-pdf-3.1-10.20.7.noarch" } }, { "category": "product_version", "name": "susemanager-docs_en-3.1-10.20.7.noarch", "product": { "name": "susemanager-docs_en-3.1-10.20.7.noarch", "product_id": "susemanager-docs_en-3.1-10.20.7.noarch" } }, { "category": "product_version", "name": "susemanager-frontend-libs-3.1.1-3.3.2.noarch", "product": { "name": "susemanager-frontend-libs-3.1.1-3.3.2.noarch", "product_id": "susemanager-frontend-libs-3.1.1-3.3.2.noarch" } }, { "category": "product_version", "name": "susemanager-getting-started_en-pdf-3.1-10.20.7.noarch", "product": { "name": "susemanager-getting-started_en-pdf-3.1-10.20.7.noarch", "product_id": "susemanager-getting-started_en-pdf-3.1-10.20.7.noarch" } }, { "category": "product_version", "name": "susemanager-jsp_en-3.1-10.20.7.noarch", "product": { "name": "susemanager-jsp_en-3.1-10.20.7.noarch", "product_id": "susemanager-jsp_en-3.1-10.20.7.noarch" } }, { "category": "product_version", "name": "susemanager-reference_en-pdf-3.1-10.20.7.noarch", "product": { "name": "susemanager-reference_en-pdf-3.1-10.20.7.noarch", "product_id": "susemanager-reference_en-pdf-3.1-10.20.7.noarch" } }, { "category": "product_version", "name": "susemanager-schema-3.1.17-2.23.3.noarch", "product": { "name": "susemanager-schema-3.1.17-2.23.3.noarch", "product_id": "susemanager-schema-3.1.17-2.23.3.noarch" } }, { "category": "product_version", "name": "susemanager-sls-3.1.17-2.23.2.noarch", "product": { "name": "susemanager-sls-3.1.17-2.23.2.noarch", "product_id": "susemanager-sls-3.1.17-2.23.2.noarch" } }, { "category": "product_version", "name": "susemanager-sync-data-3.1.14-2.23.2.noarch", "product": { "name": "susemanager-sync-data-3.1.14-2.23.2.noarch", "product_id": "susemanager-sync-data-3.1.14-2.23.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "patterns-suma_server-3.1-3.3.2.ppc64le", "product": { "name": "patterns-suma_server-3.1-3.3.2.ppc64le", "product_id": "patterns-suma_server-3.1-3.3.2.ppc64le" } }, { "category": "product_version", "name": "spacewalk-branding-2.7.2.13-2.19.5.ppc64le", "product": { "name": "spacewalk-branding-2.7.2.13-2.19.5.ppc64le", "product_id": "spacewalk-branding-2.7.2.13-2.19.5.ppc64le" } }, { "category": "product_version", "name": "susemanager-3.1.14-2.19.5.ppc64le", "product": { "name": "susemanager-3.1.14-2.19.5.ppc64le", "product_id": "susemanager-3.1.14-2.19.5.ppc64le" } }, { "category": "product_version", "name": "susemanager-tftpsync-3.1.3-3.6.2.ppc64le", "product": { "name": "susemanager-tftpsync-3.1.3-3.6.2.ppc64le", "product_id": "susemanager-tftpsync-3.1.3-3.6.2.ppc64le" } }, { "category": "product_version", "name": "susemanager-tools-3.1.14-2.19.5.ppc64le", "product": { "name": "susemanager-tools-3.1.14-2.19.5.ppc64le", "product_id": "susemanager-tools-3.1.14-2.19.5.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "patterns-suma_server-3.1-3.3.2.s390x", "product": { "name": "patterns-suma_server-3.1-3.3.2.s390x", "product_id": "patterns-suma_server-3.1-3.3.2.s390x" } }, { "category": "product_version", "name": "spacewalk-branding-2.7.2.13-2.19.5.s390x", "product": { "name": "spacewalk-branding-2.7.2.13-2.19.5.s390x", "product_id": "spacewalk-branding-2.7.2.13-2.19.5.s390x" } }, { "category": "product_version", "name": "susemanager-3.1.14-2.19.5.s390x", "product": { "name": "susemanager-3.1.14-2.19.5.s390x", "product_id": "susemanager-3.1.14-2.19.5.s390x" } }, { "category": "product_version", "name": "susemanager-tftpsync-3.1.3-3.6.2.s390x", "product": { "name": "susemanager-tftpsync-3.1.3-3.6.2.s390x", "product_id": "susemanager-tftpsync-3.1.3-3.6.2.s390x" } }, { "category": "product_version", "name": "susemanager-tools-3.1.14-2.19.5.s390x", "product": { "name": "susemanager-tools-3.1.14-2.19.5.s390x", "product_id": "susemanager-tools-3.1.14-2.19.5.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "patterns-suma_server-3.1-3.3.2.x86_64", "product": { "name": "patterns-suma_server-3.1-3.3.2.x86_64", "product_id": "patterns-suma_server-3.1-3.3.2.x86_64" } }, { "category": "product_version", "name": "spacewalk-branding-2.7.2.13-2.19.5.x86_64", "product": { "name": "spacewalk-branding-2.7.2.13-2.19.5.x86_64", "product_id": "spacewalk-branding-2.7.2.13-2.19.5.x86_64" } }, { "category": "product_version", "name": "susemanager-3.1.14-2.19.5.x86_64", "product": { "name": "susemanager-3.1.14-2.19.5.x86_64", "product_id": "susemanager-3.1.14-2.19.5.x86_64" } }, { "category": "product_version", "name": "susemanager-tftpsync-3.1.3-3.6.2.x86_64", "product": { "name": "susemanager-tftpsync-3.1.3-3.6.2.x86_64", "product_id": "susemanager-tftpsync-3.1.3-3.6.2.x86_64" } }, { "category": "product_version", "name": "susemanager-tools-3.1.14-2.19.5.x86_64", "product": { "name": "susemanager-tools-3.1.14-2.19.5.x86_64", "product_id": "susemanager-tools-3.1.14-2.19.5.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Manager Server 3.1", "product": { "name": "SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:3.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cobbler-2.6.6-5.10.4.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:cobbler-2.6.6-5.10.4.noarch" }, "product_reference": "cobbler-2.6.6-5.10.4.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "google-gson-2.8.2-3.3.6.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:google-gson-2.8.2-3.3.6.noarch" }, "product_reference": "google-gson-2.8.2-3.3.6.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "patterns-suma_server-3.1-3.3.2.ppc64le as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.ppc64le" }, "product_reference": "patterns-suma_server-3.1-3.3.2.ppc64le", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "patterns-suma_server-3.1-3.3.2.s390x as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.s390x" }, "product_reference": "patterns-suma_server-3.1-3.3.2.s390x", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "patterns-suma_server-3.1-3.3.2.x86_64 as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.x86_64" }, "product_reference": "patterns-suma_server-3.1-3.3.2.x86_64", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "prometheus-client-java-0.3.0-1.3.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:prometheus-client-java-0.3.0-1.3.5.noarch" }, "product_reference": "prometheus-client-java-0.3.0-1.3.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "py26-compat-salt-2016.11.4-1.7.2.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:py26-compat-salt-2016.11.4-1.7.2.noarch" }, "product_reference": "py26-compat-salt-2016.11.4-1.7.2.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "salt-netapi-client-0.14.0-3.9.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:salt-netapi-client-0.14.0-3.9.5.noarch" }, "product_reference": "salt-netapi-client-0.14.0-3.9.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-2.7.73.13-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-backend-2.7.73.13-2.19.5.noarch" }, "product_reference": "spacewalk-backend-2.7.73.13-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-app-2.7.73.13-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.13-2.19.5.noarch" }, "product_reference": "spacewalk-backend-app-2.7.73.13-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-applet-2.7.73.13-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.13-2.19.5.noarch" }, "product_reference": "spacewalk-backend-applet-2.7.73.13-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-config-files-2.7.73.13-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.13-2.19.5.noarch" }, "product_reference": "spacewalk-backend-config-files-2.7.73.13-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-config-files-common-2.7.73.13-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.13-2.19.5.noarch" }, "product_reference": "spacewalk-backend-config-files-common-2.7.73.13-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-config-files-tool-2.7.73.13-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.13-2.19.5.noarch" }, "product_reference": "spacewalk-backend-config-files-tool-2.7.73.13-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-iss-2.7.73.13-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.13-2.19.5.noarch" }, "product_reference": "spacewalk-backend-iss-2.7.73.13-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-iss-export-2.7.73.13-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.13-2.19.5.noarch" }, "product_reference": "spacewalk-backend-iss-export-2.7.73.13-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-libs-2.7.73.13-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.13-2.19.5.noarch" }, "product_reference": "spacewalk-backend-libs-2.7.73.13-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-package-push-server-2.7.73.13-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.13-2.19.5.noarch" }, "product_reference": "spacewalk-backend-package-push-server-2.7.73.13-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-server-2.7.73.13-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.13-2.19.5.noarch" }, "product_reference": "spacewalk-backend-server-2.7.73.13-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-sql-2.7.73.13-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.13-2.19.5.noarch" }, "product_reference": "spacewalk-backend-sql-2.7.73.13-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-sql-oracle-2.7.73.13-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.13-2.19.5.noarch" }, "product_reference": "spacewalk-backend-sql-oracle-2.7.73.13-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-sql-postgresql-2.7.73.13-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.13-2.19.5.noarch" }, "product_reference": "spacewalk-backend-sql-postgresql-2.7.73.13-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-tools-2.7.73.13-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.13-2.19.5.noarch" }, "product_reference": "spacewalk-backend-tools-2.7.73.13-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-xml-export-libs-2.7.73.13-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.13-2.19.5.noarch" }, "product_reference": "spacewalk-backend-xml-export-libs-2.7.73.13-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-backend-xmlrpc-2.7.73.13-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.13-2.19.5.noarch" }, "product_reference": "spacewalk-backend-xmlrpc-2.7.73.13-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-base-2.7.1.16-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-base-2.7.1.16-2.19.5.noarch" }, "product_reference": "spacewalk-base-2.7.1.16-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-base-minimal-2.7.1.16-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.16-2.19.5.noarch" }, "product_reference": "spacewalk-base-minimal-2.7.1.16-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-base-minimal-config-2.7.1.16-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.16-2.19.5.noarch" }, "product_reference": "spacewalk-base-minimal-config-2.7.1.16-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-branding-2.7.2.13-2.19.5.ppc64le as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.ppc64le" }, "product_reference": "spacewalk-branding-2.7.2.13-2.19.5.ppc64le", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-branding-2.7.2.13-2.19.5.s390x as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.s390x" }, "product_reference": "spacewalk-branding-2.7.2.13-2.19.5.s390x", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-branding-2.7.2.13-2.19.5.x86_64 as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.x86_64" }, "product_reference": "spacewalk-branding-2.7.2.13-2.19.5.x86_64", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-certs-tools-2.7.0.10-2.12.4.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-certs-tools-2.7.0.10-2.12.4.noarch" }, "product_reference": "spacewalk-certs-tools-2.7.0.10-2.12.4.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-html-2.7.1.16-2.19.5.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-html-2.7.1.16-2.19.5.noarch" }, "product_reference": "spacewalk-html-2.7.1.16-2.19.5.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-2.7.46.14-2.25.1.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-java-2.7.46.14-2.25.1.noarch" }, "product_reference": "spacewalk-java-2.7.46.14-2.25.1.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-config-2.7.46.14-2.25.1.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.14-2.25.1.noarch" }, "product_reference": "spacewalk-java-config-2.7.46.14-2.25.1.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-lib-2.7.46.14-2.25.1.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.14-2.25.1.noarch" }, "product_reference": "spacewalk-java-lib-2.7.46.14-2.25.1.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-oracle-2.7.46.14-2.25.1.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.14-2.25.1.noarch" }, "product_reference": "spacewalk-java-oracle-2.7.46.14-2.25.1.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-java-postgresql-2.7.46.14-2.25.1.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.14-2.25.1.noarch" }, "product_reference": "spacewalk-java-postgresql-2.7.46.14-2.25.1.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-taskomatic-2.7.46.14-2.25.1.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.14-2.25.1.noarch" }, "product_reference": "spacewalk-taskomatic-2.7.46.14-2.25.1.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "spacewalk-utils-2.7.10.7-2.10.4.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:spacewalk-utils-2.7.10.7-2.10.4.noarch" }, "product_reference": "spacewalk-utils-2.7.10.7-2.10.4.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-3.1.14-2.19.5.ppc64le as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.ppc64le" }, "product_reference": "susemanager-3.1.14-2.19.5.ppc64le", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-3.1.14-2.19.5.s390x as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.s390x" }, "product_reference": "susemanager-3.1.14-2.19.5.s390x", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-3.1.14-2.19.5.x86_64 as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.x86_64" }, "product_reference": "susemanager-3.1.14-2.19.5.x86_64", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-advanced-topics_en-pdf-3.1-10.20.7.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:susemanager-advanced-topics_en-pdf-3.1-10.20.7.noarch" }, "product_reference": "susemanager-advanced-topics_en-pdf-3.1-10.20.7.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-best-practices_en-pdf-3.1-10.20.7.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:susemanager-best-practices_en-pdf-3.1-10.20.7.noarch" }, "product_reference": "susemanager-best-practices_en-pdf-3.1-10.20.7.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-docs_en-3.1-10.20.7.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:susemanager-docs_en-3.1-10.20.7.noarch" }, "product_reference": "susemanager-docs_en-3.1-10.20.7.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-frontend-libs-3.1.1-3.3.2.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:susemanager-frontend-libs-3.1.1-3.3.2.noarch" }, "product_reference": "susemanager-frontend-libs-3.1.1-3.3.2.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-getting-started_en-pdf-3.1-10.20.7.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:susemanager-getting-started_en-pdf-3.1-10.20.7.noarch" }, "product_reference": "susemanager-getting-started_en-pdf-3.1-10.20.7.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-jsp_en-3.1-10.20.7.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:susemanager-jsp_en-3.1-10.20.7.noarch" }, "product_reference": "susemanager-jsp_en-3.1-10.20.7.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-reference_en-pdf-3.1-10.20.7.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:susemanager-reference_en-pdf-3.1-10.20.7.noarch" }, "product_reference": "susemanager-reference_en-pdf-3.1-10.20.7.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-schema-3.1.17-2.23.3.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:susemanager-schema-3.1.17-2.23.3.noarch" }, "product_reference": "susemanager-schema-3.1.17-2.23.3.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-sls-3.1.17-2.23.2.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:susemanager-sls-3.1.17-2.23.2.noarch" }, "product_reference": "susemanager-sls-3.1.17-2.23.2.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-sync-data-3.1.14-2.23.2.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:susemanager-sync-data-3.1.14-2.23.2.noarch" }, "product_reference": "susemanager-sync-data-3.1.14-2.23.2.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-tftpsync-3.1.3-3.6.2.ppc64le as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.ppc64le" }, "product_reference": "susemanager-tftpsync-3.1.3-3.6.2.ppc64le", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-tftpsync-3.1.3-3.6.2.s390x as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.s390x" }, "product_reference": "susemanager-tftpsync-3.1.3-3.6.2.s390x", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-tftpsync-3.1.3-3.6.2.x86_64 as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.x86_64" }, "product_reference": "susemanager-tftpsync-3.1.3-3.6.2.x86_64", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-tools-3.1.14-2.19.5.ppc64le as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.ppc64le" }, "product_reference": "susemanager-tools-3.1.14-2.19.5.ppc64le", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-tools-3.1.14-2.19.5.s390x as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.s390x" }, "product_reference": "susemanager-tools-3.1.14-2.19.5.s390x", "relates_to_product_reference": "SUSE Manager Server 3.1" }, { "category": "default_component_of", "full_product_name": { "name": "susemanager-tools-3.1.14-2.19.5.x86_64 as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.x86_64" }, "product_reference": "susemanager-tools-3.1.14-2.19.5.x86_64", "relates_to_product_reference": "SUSE Manager Server 3.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-5326", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-5326" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Server 3.1:cobbler-2.6.6-5.10.4.noarch", "SUSE Manager Server 3.1:google-gson-2.8.2-3.3.6.noarch", "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.ppc64le", "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.s390x", "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.x86_64", "SUSE Manager Server 3.1:prometheus-client-java-0.3.0-1.3.5.noarch", "SUSE Manager Server 3.1:py26-compat-salt-2016.11.4-1.7.2.noarch", "SUSE Manager Server 3.1:salt-netapi-client-0.14.0-3.9.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-base-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.ppc64le", "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.s390x", "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.x86_64", "SUSE Manager Server 3.1:spacewalk-certs-tools-2.7.0.10-2.12.4.noarch", "SUSE Manager Server 3.1:spacewalk-html-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-java-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-utils-2.7.10.7-2.10.4.noarch", "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.ppc64le", "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.s390x", "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.x86_64", "SUSE Manager Server 3.1:susemanager-advanced-topics_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-best-practices_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-docs_en-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-frontend-libs-3.1.1-3.3.2.noarch", "SUSE Manager Server 3.1:susemanager-getting-started_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-jsp_en-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-reference_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-schema-3.1.17-2.23.3.noarch", "SUSE Manager Server 3.1:susemanager-sls-3.1.17-2.23.2.noarch", "SUSE Manager Server 3.1:susemanager-sync-data-3.1.14-2.23.2.noarch", "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.ppc64le", "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.s390x", "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.x86_64", "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.ppc64le", "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.s390x", "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-5326", "url": "https://www.suse.com/security/cve/CVE-2014-5326" }, { "category": "external", "summary": "SUSE Bug 1085650 for CVE-2014-5326", "url": "https://bugzilla.suse.com/1085650" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Server 3.1:cobbler-2.6.6-5.10.4.noarch", "SUSE Manager Server 3.1:google-gson-2.8.2-3.3.6.noarch", "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.ppc64le", "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.s390x", "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.x86_64", "SUSE Manager Server 3.1:prometheus-client-java-0.3.0-1.3.5.noarch", "SUSE Manager Server 3.1:py26-compat-salt-2016.11.4-1.7.2.noarch", "SUSE Manager Server 3.1:salt-netapi-client-0.14.0-3.9.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-base-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.ppc64le", "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.s390x", "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.x86_64", "SUSE Manager Server 3.1:spacewalk-certs-tools-2.7.0.10-2.12.4.noarch", "SUSE Manager Server 3.1:spacewalk-html-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-java-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-utils-2.7.10.7-2.10.4.noarch", "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.ppc64le", "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.s390x", "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.x86_64", "SUSE Manager Server 3.1:susemanager-advanced-topics_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-best-practices_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-docs_en-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-frontend-libs-3.1.1-3.3.2.noarch", "SUSE Manager Server 3.1:susemanager-getting-started_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-jsp_en-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-reference_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-schema-3.1.17-2.23.3.noarch", "SUSE Manager Server 3.1:susemanager-sls-3.1.17-2.23.2.noarch", "SUSE Manager Server 3.1:susemanager-sync-data-3.1.14-2.23.2.noarch", "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.ppc64le", "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.s390x", "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.x86_64", "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.ppc64le", "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.s390x", "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Manager Server 3.1:cobbler-2.6.6-5.10.4.noarch", "SUSE Manager Server 3.1:google-gson-2.8.2-3.3.6.noarch", "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.ppc64le", "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.s390x", "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.x86_64", "SUSE Manager Server 3.1:prometheus-client-java-0.3.0-1.3.5.noarch", "SUSE Manager Server 3.1:py26-compat-salt-2016.11.4-1.7.2.noarch", "SUSE Manager Server 3.1:salt-netapi-client-0.14.0-3.9.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-base-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.ppc64le", "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.s390x", "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.x86_64", "SUSE Manager Server 3.1:spacewalk-certs-tools-2.7.0.10-2.12.4.noarch", "SUSE Manager Server 3.1:spacewalk-html-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-java-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-utils-2.7.10.7-2.10.4.noarch", "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.ppc64le", "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.s390x", "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.x86_64", "SUSE Manager Server 3.1:susemanager-advanced-topics_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-best-practices_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-docs_en-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-frontend-libs-3.1.1-3.3.2.noarch", "SUSE Manager Server 3.1:susemanager-getting-started_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-jsp_en-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-reference_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-schema-3.1.17-2.23.3.noarch", "SUSE Manager Server 3.1:susemanager-sls-3.1.17-2.23.2.noarch", "SUSE Manager Server 3.1:susemanager-sync-data-3.1.14-2.23.2.noarch", "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.ppc64le", "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.s390x", "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.x86_64", "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.ppc64le", "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.s390x", "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-19T13:47:15Z", "details": "moderate" } ], "title": "CVE-2014-5326" }, { "cve": "CVE-2017-1000469", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000469" } ], "notes": [ { "category": "general", "text": "Cobbler version up to 2.8.2 is vulnerable to a command injection vulnerability in the \"add repo\" component resulting in arbitrary code execution as root user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Server 3.1:cobbler-2.6.6-5.10.4.noarch", "SUSE Manager Server 3.1:google-gson-2.8.2-3.3.6.noarch", "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.ppc64le", "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.s390x", "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.x86_64", "SUSE Manager Server 3.1:prometheus-client-java-0.3.0-1.3.5.noarch", "SUSE Manager Server 3.1:py26-compat-salt-2016.11.4-1.7.2.noarch", "SUSE Manager Server 3.1:salt-netapi-client-0.14.0-3.9.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-base-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.ppc64le", "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.s390x", "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.x86_64", "SUSE Manager Server 3.1:spacewalk-certs-tools-2.7.0.10-2.12.4.noarch", "SUSE Manager Server 3.1:spacewalk-html-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-java-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-utils-2.7.10.7-2.10.4.noarch", "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.ppc64le", "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.s390x", "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.x86_64", "SUSE Manager Server 3.1:susemanager-advanced-topics_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-best-practices_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-docs_en-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-frontend-libs-3.1.1-3.3.2.noarch", "SUSE Manager Server 3.1:susemanager-getting-started_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-jsp_en-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-reference_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-schema-3.1.17-2.23.3.noarch", "SUSE Manager Server 3.1:susemanager-sls-3.1.17-2.23.2.noarch", "SUSE Manager Server 3.1:susemanager-sync-data-3.1.14-2.23.2.noarch", "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.ppc64le", "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.s390x", "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.x86_64", "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.ppc64le", "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.s390x", "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000469", "url": "https://www.suse.com/security/cve/CVE-2017-1000469" }, { "category": "external", "summary": "SUSE Bug 1074594 for CVE-2017-1000469", "url": "https://bugzilla.suse.com/1074594" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Server 3.1:cobbler-2.6.6-5.10.4.noarch", "SUSE Manager Server 3.1:google-gson-2.8.2-3.3.6.noarch", "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.ppc64le", "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.s390x", "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.x86_64", "SUSE Manager Server 3.1:prometheus-client-java-0.3.0-1.3.5.noarch", "SUSE Manager Server 3.1:py26-compat-salt-2016.11.4-1.7.2.noarch", "SUSE Manager Server 3.1:salt-netapi-client-0.14.0-3.9.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-base-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.ppc64le", "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.s390x", "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.x86_64", "SUSE Manager Server 3.1:spacewalk-certs-tools-2.7.0.10-2.12.4.noarch", "SUSE Manager Server 3.1:spacewalk-html-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-java-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-utils-2.7.10.7-2.10.4.noarch", "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.ppc64le", "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.s390x", "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.x86_64", "SUSE Manager Server 3.1:susemanager-advanced-topics_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-best-practices_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-docs_en-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-frontend-libs-3.1.1-3.3.2.noarch", "SUSE Manager Server 3.1:susemanager-getting-started_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-jsp_en-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-reference_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-schema-3.1.17-2.23.3.noarch", "SUSE Manager Server 3.1:susemanager-sls-3.1.17-2.23.2.noarch", "SUSE Manager Server 3.1:susemanager-sync-data-3.1.14-2.23.2.noarch", "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.ppc64le", "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.s390x", "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.x86_64", "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.ppc64le", "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.s390x", "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Manager Server 3.1:cobbler-2.6.6-5.10.4.noarch", "SUSE Manager Server 3.1:google-gson-2.8.2-3.3.6.noarch", "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.ppc64le", "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.s390x", "SUSE Manager Server 3.1:patterns-suma_server-3.1-3.3.2.x86_64", "SUSE Manager Server 3.1:prometheus-client-java-0.3.0-1.3.5.noarch", "SUSE Manager Server 3.1:py26-compat-salt-2016.11.4-1.7.2.noarch", "SUSE Manager Server 3.1:salt-netapi-client-0.14.0-3.9.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-app-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-applet-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-config-files-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-config-files-common-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-config-files-tool-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-iss-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-iss-export-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-libs-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-package-push-server-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-server-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-sql-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-sql-oracle-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-sql-postgresql-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-tools-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-xml-export-libs-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-backend-xmlrpc-2.7.73.13-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-base-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-base-minimal-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-base-minimal-config-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.ppc64le", "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.s390x", "SUSE Manager Server 3.1:spacewalk-branding-2.7.2.13-2.19.5.x86_64", "SUSE Manager Server 3.1:spacewalk-certs-tools-2.7.0.10-2.12.4.noarch", "SUSE Manager Server 3.1:spacewalk-html-2.7.1.16-2.19.5.noarch", "SUSE Manager Server 3.1:spacewalk-java-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-config-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-lib-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-oracle-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-java-postgresql-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-taskomatic-2.7.46.14-2.25.1.noarch", "SUSE Manager Server 3.1:spacewalk-utils-2.7.10.7-2.10.4.noarch", "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.ppc64le", "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.s390x", "SUSE Manager Server 3.1:susemanager-3.1.14-2.19.5.x86_64", "SUSE Manager Server 3.1:susemanager-advanced-topics_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-best-practices_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-docs_en-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-frontend-libs-3.1.1-3.3.2.noarch", "SUSE Manager Server 3.1:susemanager-getting-started_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-jsp_en-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-reference_en-pdf-3.1-10.20.7.noarch", "SUSE Manager Server 3.1:susemanager-schema-3.1.17-2.23.3.noarch", "SUSE Manager Server 3.1:susemanager-sls-3.1.17-2.23.2.noarch", "SUSE Manager Server 3.1:susemanager-sync-data-3.1.14-2.23.2.noarch", "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.ppc64le", "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.s390x", "SUSE Manager Server 3.1:susemanager-tftpsync-3.1.3-3.6.2.x86_64", "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.ppc64le", "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.s390x", "SUSE Manager Server 3.1:susemanager-tools-3.1.14-2.19.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2018-06-19T13:47:15Z", "details": "moderate" } ], "title": "CVE-2017-1000469" } ] }
suse-su-2018:1743-1
Vulnerability from csaf_suse
Published
2018-06-19 13:46
Modified
2018-06-19 13:46
Summary
Security update for dwr
Notes
Title of the patch
Security update for dwr
Description of the patch
This update for dwr fixes the following issues:
Security issue fixed:
- CVE-2014-5326: Fix cross-site scripting (XSS) vulnerability (bsc#1085650).
Patchnames
SUSE-SUSE-Manager-Server-3.1-2018-1173
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for dwr", "title": "Title of the patch" }, { "category": "description", "text": "This update for dwr fixes the following issues:\n\nSecurity issue fixed:\n\n- CVE-2014-5326: Fix cross-site scripting (XSS) vulnerability (bsc#1085650).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SUSE-Manager-Server-3.1-2018-1173", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2018_1743-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2018:1743-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181743-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2018:1743-1", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181743-1.html" }, { "category": "self", "summary": "SUSE Bug 1085650", "url": "https://bugzilla.suse.com/1085650" }, { "category": "self", "summary": "SUSE CVE CVE-2014-5326 page", "url": "https://www.suse.com/security/cve/CVE-2014-5326/" } ], "title": "Security update for dwr", "tracking": { "current_release_date": "2018-06-19T13:46:41Z", "generator": { "date": "2018-06-19T13:46:41Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2018:1743-1", "initial_release_date": "2018-06-19T13:46:41Z", "revision_history": [ { "date": "2018-06-19T13:46:41Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "dwr-3.0rc2+svn4059-0.12.3.10.noarch", "product": { "name": "dwr-3.0rc2+svn4059-0.12.3.10.noarch", "product_id": "dwr-3.0rc2+svn4059-0.12.3.10.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_name", "name": "SUSE Manager Server 3.1", "product": { "name": "SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:3.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "dwr-3.0rc2+svn4059-0.12.3.10.noarch as component of SUSE Manager Server 3.1", "product_id": "SUSE Manager Server 3.1:dwr-3.0rc2+svn4059-0.12.3.10.noarch" }, "product_reference": "dwr-3.0rc2+svn4059-0.12.3.10.noarch", "relates_to_product_reference": "SUSE Manager Server 3.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-5326", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-5326" } ], "notes": [ { "category": "general", "text": "Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Manager Server 3.1:dwr-3.0rc2+svn4059-0.12.3.10.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2014-5326", "url": "https://www.suse.com/security/cve/CVE-2014-5326" }, { "category": "external", "summary": "SUSE Bug 1085650 for CVE-2014-5326", "url": "https://bugzilla.suse.com/1085650" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Manager Server 3.1:dwr-3.0rc2+svn4059-0.12.3.10.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Manager Server 3.1:dwr-3.0rc2+svn4059-0.12.3.10.noarch" ] } ], "threats": [ { "category": "impact", "date": "2018-06-19T13:46:41Z", "details": "moderate" } ], "title": "CVE-2014-5326" } ] }
ghsa-q5v2-2v66-6hwm
Vulnerability from github
Published
2022-05-17 04:21
Modified
2022-07-06 21:05
VLAI Severity ?
Summary
Improper Neutralization of Input During Web Page Generation in Direct Web Remoting
Details
Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.directwebremoting:dwr" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.0.11" } ], "type": "ECOSYSTEM" } ] }, { "database_specific": { "last_known_affected_version_range": "\u003c= 3.0.RC2" }, "package": { "ecosystem": "Maven", "name": "org.directwebremoting:dwr" }, "ranges": [ { "events": [ { "introduced": "3.0.M1" }, { "fixed": "3.0.RC3" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2014-5326" ], "database_specific": { "cwe_ids": [ "CWE-79" ], "github_reviewed": true, "github_reviewed_at": "2022-07-06T21:05:35Z", "nvd_published_at": "2014-11-24T02:59:00Z", "severity": "MODERATE" }, "details": "Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.", "id": "GHSA-q5v2-2v66-6hwm", "modified": "2022-07-06T21:05:35Z", "published": "2022-05-17T04:21:06Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5326" }, { "type": "WEB", "url": "http://jvn.jp/en/jp/JVN52422792/index.html" }, { "type": "WEB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000118" } ], "schema_version": "1.4.0", "severity": [], "summary": "Improper Neutralization of Input During Web Page Generation in Direct Web Remoting" }
gsd-2014-5326
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2014-5326", "description": "Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.", "id": "GSD-2014-5326", "references": [ "https://www.suse.com/security/cve/CVE-2014-5326.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-5326" ], "details": "Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.", "id": "GSD-2014-5326", "modified": "2023-12-13T01:22:52.570160Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2014-5326", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "JVN#52422792", "refsource": "JVN", "url": "http://jvn.jp/en/jp/JVN52422792/index.html" }, { "name": "JVNDB-2014-000118", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000118" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "(,2.0.11)", "affected_versions": "All versions before 2.0.11", "cvss_v2": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "cwe_ids": [ "CWE-1035", "CWE-79", "CWE-79", "CWE-937" ], "date": "2022-07-06", "description": "Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.", "fixed_versions": [ "2.0.11" ], "identifier": "CVE-2014-5326", "identifiers": [ "GHSA-q5v2-2v66-6hwm", "CVE-2014-5326" ], "not_impacted": "All versions starting from 2.0.11", "package_slug": "maven/org.directwebremoting/dwr", "pubdate": "2022-05-17", "solution": "Upgrade to version 2.0.11 or above.", "title": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2014-5326", "http://jvn.jp/en/jp/JVN52422792/index.html", "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000118", "https://github.com/advisories/GHSA-q5v2-2v66-6hwm" ], "uuid": "7f1411b1-64b4-4fbf-a8be-26e53483e1fe" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:directwebremoting:direct_web_remoting:3.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:directwebremoting:direct_web_remoting:3.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:directwebremoting:direct_web_remoting:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.0.10", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2014-5326" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Direct Web Remoting (DWR) through 2.0.10 and 3.x through 3.0.RC2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "JVNDB-2014-000118", "refsource": "JVNDB", "tags": [], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000118" }, { "name": "JVN#52422792", "refsource": "JVN", "tags": [], "url": "http://jvn.jp/en/jp/JVN52422792/index.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true } }, "lastModifiedDate": "2014-11-24T15:39Z", "publishedDate": "2014-11-24T02:59Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…